Total vulnerabilities in the database
Buffer overflow in the regular expression handler in Red Hat Directory Server 8.0 and 7.1 before SP6 allows remote attackers to cause a denial of service (slapd crash) and possibly execute arbitrary code via a crafted LDAP query that triggers the overflow during translation to a regular expression.
Software | From | Fixed in |
---|---|---|
redhat / directory_server | 7.1-sp4 | 7.1-sp4.x |
redhat / directory_server | 7.1-sp2 | 7.1-sp2.x |
redhat / directory_server | 7.1-sp1 | 7.1-sp1.x |
redhat / directory_server | 8.0 | 8.0.x |
redhat / directory_server | 7.1-sp5 | 7.1-sp5.x |
redhat / directory_server | 7.1-sp3 | 7.1-sp3.x |
redhat / fedora_directory_server | 1.1 | 1.1.x |