First published: Thu Feb 23 2006(Updated: )
Buffer overflow in the regular expression handler in Red Hat Directory Server 8.0 and 7.1 before SP6 allows remote attackers to cause a denial of service (slapd crash) and possibly execute arbitrary code via a crafted LDAP query that triggers the overflow during translation to a regular expression.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/redhat-ds-base | <0:8.0.3-16.el5d | 0:8.0.3-16.el5d |
Red Hat Directory Server | =7.1-sp1 | |
Red Hat Directory Server | =7.1-sp2 | |
Red Hat Directory Server | =7.1-sp3 | |
Red Hat Directory Server | =7.1-sp4 | |
Red Hat Directory Server | =7.1-sp5 | |
Red Hat Directory Server | =8.0 | |
Red Hat Fedora Directory Server | =1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-1677 is classified as a high severity vulnerability due to its potential to cause denial of service and possibly allow remote code execution.
To fix CVE-2008-1677, update Red Hat Directory Server to version 8.0.3-16.el5d or install the necessary service packs for version 7.1.
CVE-2008-1677 affects Red Hat Directory Server versions 7.1 (all service packs up to SP5) and 8.0 prior to SP6.
Yes, CVE-2008-1677 can be exploited remotely through crafted LDAP queries.
The impact of CVE-2008-1677 includes the potential for denial of service due to slapd crashes and possible execution of arbitrary code.