---------------------------------------------------------------------- Secunia Network Software Inspector 2.0 (NSI) - Public Beta The Public Beta has ended. Thanks to all that participated. Learn more: http://secunia.com/network_software_inspector_2/ ---------------------------------------------------------------------- TITLE: Red Hat Directory Server Regular Expression Handler Buffer Overflow SECUNIA ADVISORY ID: SA30181 VERIFY ADVISORY: http://secunia.com/advisories/30181/ CRITICAL: Moderately critical IMPACT: DoS, System access WHERE: >From local network REVISION: 1.1 originally posted 2008-05-12 SOFTWARE: Red Hat Directory Server 7.x http://secunia.com/product/7016/ Red Hat Directory Server 8.x http://secunia.com/product/18012/ DESCRIPTION: A vulnerability has been reported in Red Hat Directory Server, which can be exploited by malicious users to cause a DoS (Denial of Service) or potentially compromise a vulnerable system. The vulnerability is caused due to a boundary error in the regular expression handler and can be exploited to cause a buffer overflow by supplying an overly long regular expression in an LDAP search. Successful exploitation may allow execution of arbitrary code. SOLUTION: Updated packages are available via Red Hat Network. http://rhn.redhat.com/ PROVIDED AND/OR DISCOVERED BY: Nathan Kinder CHANGELOG: 2008-05-12: Added link to RHSA-2008-0268. ORIGINAL ADVISORY: http://rhn.redhat.com/errata/RHSA-2008-0269.html http://rhn.redhat.com/errata/RHSA-2008-0268.html ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------