Stack-based buffer overflow in st.c in slurpd for OpenLDAP before 2.3.22 might allow attackers to execute arbitrary code via a long hostname.Referenceshttps://usn.ubuntu.com/305-1/http://www.openldap.org/devel/cvsweb.cgi/servers/slurpd/st.c.diff?r1=1.21&r2=1.22&hideattic=1&sortbydate=0&f=hhttp://secunia.com/advisories/20126http://secunia.com/advisories/20495http://www.openldap.org/devel/cvsweb.cgi/servers/slurpd/st.c?hideattic=1&sortbydate=0#rev1.22http://www.vupen.com/english/advisories/2006/1921http://www.gentoo.org/security/en/glsa/glsa-200606-17.xmlhttp://www.securityfocus.com/archive/1/436674/100/0/threadedhttp://www.mandriva.com/security/advisories?name=MDKSA-2006:096http://secunia.com/advisories/20685http://www.osvdb.org/25659http://www.openpkg.org/security/advisories/OpenPKG-SA-2006.008-openldap.htmlhttp://www.openldap.org/software/release/changes.htmlhttp://secunia.com/advisories/20848