HIGH · 7.5

CVE-2008-1677

Buffer overflow in the regular expression handler in Red Hat Directory Server 8.0 and 7.1 before SP6 allows remote attackers to cause a denial of service (slapd crash) and possibly execute arbitrary c...

Vulnerability Description

Buffer overflow in the regular expression handler in Red Hat Directory Server 8.0 and 7.1 before SP6 allows remote attackers to cause a denial of service (slapd crash) and possibly execute arbitrary code via a crafted LDAP query that triggers the overflow during translation to a regular expression.

CVSS Score

7.5

HIGH

AV:N/AC:L/Au:N/C:P/I:P/A:P
Confidentiality
PARTIAL
Integrity
PARTIAL
Availability
PARTIAL

Affected Products

VendorProductVersions
RedhatDirectory Server7.1
RedhatFedora Directory Server1.1

Related Weaknesses (CWE)

References

FAQ

What is CVE-2008-1677?

CVE-2008-1677 is a vulnerability with a CVSS score of 7.5 (HIGH). Buffer overflow in the regular expression handler in Red Hat Directory Server 8.0 and 7.1 before SP6 allows remote attackers to cause a denial of service (slapd crash) and possibly execute arbitrary c...

How severe is CVE-2008-1677?

CVE-2008-1677 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2008-1677?

Check the references section above for vendor advisories and patch information. Affected products include: Redhat Directory Server, Redhat Fedora Directory Server.