Stack-based buffer overflow in st.c in slurpd for OpenLDAP before 2.3.22 might allow attackers to execute arbitrary code via a long hostname.
http://www.vupen.com/english/advisories/2006/1921
http://www.securityfocus.com/archive/1/436674/100/0/threaded
http://www.openpkg.org/security/advisories/OpenPKG-SA-2006.008-openldap.html
http://www.openldap.org/software/release/changes.html
http://www.openldap.org/devel/cvsweb.cgi/servers/slurpd/st.c?hideattic=1&sortbydate=0#rev1.22
http://www.mandriva.com/security/advisories?name=MDKSA-2006:096
http://www.gentoo.org/security/en/glsa/glsa-200606-17.xml
http://secunia.com/advisories/20848
http://secunia.com/advisories/20685