Buffer overflow in the regular expression handler in Red Hat Directory Server 8.0 and 7.1 before SP6 allows remote malicious users to cause a denial of service (slapd crash) and possibly execute arbitrary code via a crafted LDAP query that triggers the overflow during translation to a regular expression.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
redhat directory server 7.1 |
||
redhat directory server 8.0 |
||
redhat fedora directory server 1.1 |