[Forgot Password]
Login  Register Subscribe

23631

 
 

115038

 
 

95906

 
 

909

 
 

77986

 
 

109

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML

CVE-2007-5029

Date: (C)2007-09-21   (M)2017-07-31
 
CVSS Score: 5.0Access Vector: NETWORK
Exploitability Subscore: 10.0Access Complexity: LOW
Impact Subscore: 2.9Authentication: NONE
 Confidentiality: NONE
 Integrity: NONE
 Availability: PARTIAL











Dibbler 0.6.0 does not verify that certain length parameters are appropriate for buffer sizes, which allows remote attackers to trigger a buffer over-read and cause a denial of service (daemon crash), as demonstrated by incorrect behavior of the TSrvMsg constructor in SrvMessages/SrvMsg.cpp when (1) reading the option code and option length and (2) parsing options.

Reference:
http://lists.grok.org.uk/pipermail/full-disclosure/2007-September/065892.html
BID-25726
SECUNIA-26876
OSVDB-40569
dibbler-invalidoption-dos(36685)
http://labs.musecurity.com/wp-content/uploads/2007/09/mu-200709-02.txt

CWE    1
CWE-20

© 2013 SecPod Technologies