First published: Thu Feb 23 2006(Updated: )
Buffer overflow in the regular expression handler in Red Hat Directory Server 8.0 and 7.1 before SP6 allows remote attackers to cause a denial of service (slapd crash) and possibly execute arbitrary code via a crafted LDAP query that triggers the overflow during translation to a regular expression.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Redhat Directory Server | =7.1-sp4 | |
Redhat Directory Server | =7.1-sp2 | |
Redhat Directory Server | =7.1-sp1 | |
Redhat Directory Server | =8.0 | |
Redhat Directory Server | =7.1-sp5 | |
Redhat Directory Server | =7.1-sp3 | |
Redhat Fedora Directory Server | =1.1 | |
redhat/redhat-ds-base | <0:8.0.3-16.el5d | 0:8.0.3-16.el5d |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.