7.8 High
AI Score
Confidence
High
7.5 High
CVSS2
Access Vector
Access Complexity
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
0.063 Low
EPSS
Percentile
93.6%
Buffer overflow in the regular expression handler in Red Hat Directory Server 8.0 and 7.1 before SP6 allows remote attackers to cause a denial of service (slapd crash) and possibly execute arbitrary code via a crafted LDAP query that triggers the overflow during translation to a regular expression.
secunia.com/advisories/30181
secunia.com/advisories/30185
www.redhat.com/support/errata/RHSA-2008-0268.html
www.redhat.com/support/errata/RHSA-2008-0269.html
www.securityfocus.com/bid/29126
www.securitytracker.com/id?1020001
bugzilla.redhat.com/show_bug.cgi?id=444712
exchange.xforce.ibmcloud.com/vulnerabilities/42332