First published: Fri May 09 2008(Updated: )
Red Hat Directory Server is an LDAPv3 compliant server. The redhat-ds-base<br>package includes the LDAP server and command line utilities for server<br>administration.<br>A buffer overflow flaw was found in the Red Hat Directory Server 8.0<br>regular expression handler. An unauthenticated attacker could construct a<br>malicious LDAP query that could cause the LDAP server to crash, or,<br>possibly, execute arbitrary code. (CVE-2008-1677)<br>All users of Red Hat Directory Server should upgrade to this updated<br>package, which resolves this issue.
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/redhat-ds-base | <8.0.3-16.el5d | 8.0.3-16.el5d |
redhat/redhat-ds-base-devel | <8.0.3-16.el5d | 8.0.3-16.el5d |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2008:0269 is classified as critical due to a buffer overflow vulnerability.
To fix RHSA-2008:0269, upgrade the redhat-ds-base and redhat-ds-base-devel packages to version 8.0.3-16.el5d or later.
Red Hat Directory Server versions prior to 8.0.3-16.el5d are affected by RHSA-2008:0269.
RHSA-2008:0269 describes a buffer overflow vulnerability in the regular expression handler of Red Hat Directory Server.
Yes, RHSA-2008:0269 can be exploited remotely by sending crafted inputs to the Red Hat Directory Server.