CVE-2008-1677
12.05.2008, 16:20
Buffer overflow in the regular expression handler in Red Hat Directory Server 8.0 and 7.1 before SP6 allows remote attackers to cause a denial of service (slapd crash) and possibly execute arbitrary code via a crafted LDAP query that triggers the overflow during translation to a regular expression.
Vendor | Product | Version |
---|---|---|
redhat | directory_server | 7.1:sp1 |
redhat | directory_server | 7.1:sp2 |
redhat | directory_server | 7.1:sp3 |
redhat | directory_server | 7.1:sp4 |
redhat | directory_server | 7.1:sp5 |
redhat | directory_server | 8.0 |
redhat | fedora_directory_server | 1.1 |
𝑥
= Vulnerable software versions
References