Multiple stack-based buffer overflows in the use of FD_SET in TCPreen before 1.4.4 allow remote attackers to cause a denial of service via multiple concurrent connections, which result in overflows in the (1) SocketAddress::Connect function in libsolve/sockprot.cpp and (2) monitor_bridge function in src/bridge.cpp.
References
Configurations
History
21 Nov 2024, 00:40
Type | Values Removed | Values Added |
---|---|---|
References | () http://anonsvn.remlab.net/svn/tcpreen/tags/1.4.4/NEWS - | |
References | () http://osvdb.org/40317 - | |
References | () http://osvdb.org/40318 - | |
References | () http://secunia.com/advisories/28217 - Vendor Advisory | |
References | () http://secunia.com/advisories/28254 - | |
References | () http://www.debian.org/security/2008/dsa-1443 - | |
References | () http://www.securityfocus.com/bid/27018 - Patch | |
References | () http://www.vupen.com/english/advisories/2007/4318 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/39241 - |
Information
Published : 2007-12-28 00:46
Updated : 2024-11-21 00:40
NVD link : CVE-2007-6562
Mitre link : CVE-2007-6562
CVE.ORG link : CVE-2007-6562
JSON object : View
Products Affected
tcpreen
- tcpreen
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer