Buffer overflow in the regular expression handler in Red Hat Directory Server 8.0 and 7.1 before SP6 allows remote attackers to cause a denial of service (slapd crash) and possibly execute arbitrary code via a crafted LDAP query that triggers the overflow during translation to a regular expression.
https://exchange.xforce.ibmcloud.com/vulnerabilities/42332
https://bugzilla.redhat.com/show_bug.cgi?id=444712
http://www.securitytracker.com/id?1020001
http://www.securityfocus.com/bid/29126