Secunia Security Advisory - A vulnerability has been reported in Red Hat Directory Server, which can be exploited by malicious users to cause a DoS (Denial of Service) or potentially compromise a vulnerable system.
1e31f8b7410e2ac6ef3252bb956bde6bab51bf567b2a9bccea69ba37c1b56360
----------------------------------------------------------------------
Secunia Network Software Inspector 2.0 (NSI) - Public Beta
The Public Beta has ended. Thanks to all that participated.
Learn more:
http://secunia.com/network_software_inspector_2/
----------------------------------------------------------------------
TITLE:
Red Hat Directory Server Regular Expression Handler Buffer Overflow
SECUNIA ADVISORY ID:
SA30181
VERIFY ADVISORY:
http://secunia.com/advisories/30181/
CRITICAL:
Moderately critical
IMPACT:
DoS, System access
WHERE:
>From local network
REVISION:
1.1 originally posted 2008-05-12
SOFTWARE:
Red Hat Directory Server 7.x
http://secunia.com/product/7016/
Red Hat Directory Server 8.x
http://secunia.com/product/18012/
DESCRIPTION:
A vulnerability has been reported in Red Hat Directory Server, which
can be exploited by malicious users to cause a DoS (Denial of
Service) or potentially compromise a vulnerable system.
The vulnerability is caused due to a boundary error in the regular
expression handler and can be exploited to cause a buffer overflow by
supplying an overly long regular expression in an LDAP search.
Successful exploitation may allow execution of arbitrary code.
SOLUTION:
Updated packages are available via Red Hat Network.
http://rhn.redhat.com/
PROVIDED AND/OR DISCOVERED BY:
Nathan Kinder
CHANGELOG:
2008-05-12: Added link to RHSA-2008-0268.
ORIGINAL ADVISORY:
http://rhn.redhat.com/errata/RHSA-2008-0269.html
http://rhn.redhat.com/errata/RHSA-2008-0268.html
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------