7.7 High
AI Score
Confidence
Low
5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:L/Au:N/C:N/I:P/A:N
0.016 Low
EPSS
Percentile
87.0%
Stack-based buffer overflow in st.c in slurpd for OpenLDAP before 2.3.22 might allow attackers to execute arbitrary code via a long hostname.
secunia.com/advisories/20126
secunia.com/advisories/20495
secunia.com/advisories/20685
secunia.com/advisories/20848
www.gentoo.org/security/en/glsa/glsa-200606-17.xml
www.mandriva.com/security/advisories?name=MDKSA-2006:096
www.openldap.org/devel/cvsweb.cgi/servers/slurpd/st.c.diff?r1=1.21&r2=1.22&hideattic=1&sortbydate=0&f=h
www.openldap.org/devel/cvsweb.cgi/servers/slurpd/st.c?hideattic=1&sortbydate=0#rev1.22
www.openldap.org/software/release/changes.html
www.openpkg.org/security/advisories/OpenPKG-SA-2006.008-openldap.html
www.osvdb.org/25659
www.securityfocus.com/archive/1/436674/100/0/threaded
www.vupen.com/english/advisories/2006/1921
usn.ubuntu.com/305-1/