7.5
CVE-2008-1677
- EPSS 2.62%
- Published 12.05.2008 16:20:00
- Last modified 09.04.2025 00:30:58
- Source secalert@redhat.com
- Teams watchlist Login
- Open Login
Buffer overflow in the regular expression handler in Red Hat Directory Server 8.0 and 7.1 before SP6 allows remote attackers to cause a denial of service (slapd crash) and possibly execute arbitrary code via a crafted LDAP query that triggers the overflow during translation to a regular expression.
Data is provided by the National Vulnerability Database (NVD)
Redhat ≫ Directory Server Version7.1 Updatesp1
Redhat ≫ Directory Server Version7.1 Updatesp2
Redhat ≫ Directory Server Version7.1 Updatesp3
Redhat ≫ Directory Server Version7.1 Updatesp4
Redhat ≫ Directory Server Version7.1 Updatesp5
Redhat ≫ Directory Server Version8.0
Redhat ≫ Fedora Directory Server Version1.1
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 2.62% | 0.851 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 7.5 | 10 | 6.4 |
AV:N/AC:L/Au:N/C:P/I:P/A:P
|
CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow.