CVE-2008-1677

Impact:
Critical
Public Date:
2006-02-23
CWE:
CWE-119
Bugzilla:
444712: CVE-2008-1677 Directory Server: insufficient buffer size for search patterns

The MITRE CVE dictionary describes this issue as:

Buffer overflow in the regular expression handler in Red Hat Directory Server 8.0 and 7.1 before SP6 allows remote attackers to cause a denial of service (slapd crash) and possibly execute arbitrary code via a crafted LDAP query that triggers the overflow during translation to a regular expression.

Find out more about CVE-2008-1677 from the MITRE CVE dictionary dictionary and NIST NVD.

CVSS v2 metrics

Base Score 7.5
Base Metrics AV:N/AC:L/Au:N/C:P/I:P/A:P
Access Vector Network
Access Complexity Low
Authentication None
Confidentiality Impact Partial
Integrity Impact Partial
Availability Impact Partial

Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).

Red Hat Security Errata

Platform Errata Release Date
Red Hat Directory Server 8 (for RHEL 5 Server) (redhat-ds-base) RHSA-2008:0269 2008-05-09
Red Hat Directory Server 8.0 (for AS v. 4) (redhat-ds-base) RHSA-2008:0269 2008-05-09
Red Hat Directory Server 7.1 (for AS v. 3) (redhat-ds) RHSA-2008:0268 2008-05-09

Last Modified

CVE description copyright © 2017, The MITRE Corporation

Close

Welcome! Check out the Getting Started with Red Hat page for quick tours and guides for common tasks.