Multiple integer overflows in Dibbler 0.6.0 allow remote attackers to cause a denial of service (daemon crash) via packets containing options with large lengths, which trigger attempts at excessive memory allocation, as demonstrated by (1) the TSrvMsg constructor in SrvMessages/SrvMsg.cpp; the (2) TClntMsg, (3) TClntOptIAAddress, (4) TClntOptIAPrefix, (5) TOptVendorSpecInfo, and (6) TOptOptionRequest constructors; and the (7) TRelIfaceMgr::decodeRelayRepl, (8) TRelMsg::decodeOpts, and (9) TSrvIfaceMgr::decodeRelayForw methods.
References
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2007-09-21T18:00:00
Updated: 2017-07-28T12:57:01
Reserved: 2007-09-21T00:00:00
Link: CVE-2007-5030
JSON object: View
NVD Information
Status : Modified
Published: 2007-09-21T19:17:00.000
Modified: 2017-07-29T01:33:21.147
Link: CVE-2007-5030
JSON object: View
Redhat Information
No data.
CWE