Multiple integer overflows in Dibbler 0.6.0 allow remote attackers to cause a denial of service (daemon crash) via packets containing options with large lengths, which trigger attempts at excessive memory allocation, as demonstrated by (1) the TSrvMsg constructor in SrvMessages/SrvMsg.cpp; the (2) TClntMsg, (3) TClntOptIAAddress, (4) TClntOptIAPrefix, (5) TOptVendorSpecInfo, and (6) TOptOptionRequest constructors; and the (7) TRelIfaceMgr::decodeRelayRepl, (8) TRelMsg::decodeOpts, and (9) TSrvIfaceMgr::decodeRelayForw methods.
References
Configurations
History
21 Nov 2024, 00:36
Type | Values Removed | Values Added |
---|---|---|
References | () http://klub.com.pl/dhcpv6/ - | |
References | () http://labs.musecurity.com/wp-content/uploads/2007/09/mu-200709-02.txt - Patch | |
References | () http://lists.grok.org.uk/pipermail/full-disclosure/2007-September/065892.html - Patch, Vendor Advisory | |
References | () http://osvdb.org/40568 - | |
References | () http://secunia.com/advisories/26876 - Patch, Vendor Advisory | |
References | () http://www.securityfocus.com/bid/25726 - Patch | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/36684 - |
Information
Published : 2007-09-21 19:17
Updated : 2024-11-21 00:36
NVD link : CVE-2007-5030
Mitre link : CVE-2007-5030
CVE.ORG link : CVE-2007-5030
JSON object : View
Products Affected
dibbler
- dibbler
CWE
CWE-189
Numeric Errors