First published: Thu Jul 03 2008(Updated: )
A flaw was found in a Accept Language HTTP header parsers implemented in adminutil library used by various Red Hat Directory Server's Administration Server's CGI scripts. A remote attacker able to connect to Administration Server web interface could cause a CGI scripts to crash, or possibly execute an arbitrary code. Issue affects: - Red Hat Directory Server 7.1 - adminutil packages shipped in Red Hat Directory Server 8 and Fedora Directory Server, prior to adminutil version 1.1.7
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat directory server | =7.1-sp4 | |
redhat directory server | =7.1-sp6 | |
redhat directory server | =7.1-sp2 | |
redhat directory server | =7.1-sp1 | |
redhat directory server | =7.1-sp5 | |
redhat directory server | =7.1-sp3 | |
Red Hat Directory Server | =7.1-sp1 | |
Red Hat Directory Server | =7.1-sp2 | |
Red Hat Directory Server | =7.1-sp3 | |
Red Hat Directory Server | =7.1-sp4 | |
Red Hat Directory Server | =7.1-sp5 | |
Red Hat Directory Server | =7.1-sp6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-2928 has been assigned a moderate severity due to the potential for server crashes and possible exploitation via CGI scripts.
To fix CVE-2008-2928, upgrade to the latest version of Red Hat Directory Server beyond 7.1 sp6 that addresses this vulnerability.
CVE-2008-2928 affects all versions of Red Hat Directory Server 7.1 up to and including sp6.
Yes, a remote attacker with access to the Administration Server web interface can exploit CVE-2008-2928.
Exploitation of CVE-2008-2928 could lead to a crash of the CGI scripts or potentially allow code execution.