[Forgot Password]
Login  Register Subscribe

30389

 
 

423868

 
 

244625

 
 

909

 
 

193379

 
 

277

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2007-5029Date: (C)2007-09-21   (M)2023-12-22


Dibbler 0.6.0 does not verify that certain length parameters are appropriate for buffer sizes, which allows remote attackers to trigger a buffer over-read and cause a denial of service (daemon crash), as demonstrated by incorrect behavior of the TSrvMsg constructor in SrvMessages/SrvMsg.cpp when (1) reading the option code and option length and (2) parsing options.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 5.0
Exploit Score: 10.0
Impact Score: 2.9
 
CVSS V2 Metrics:
Access Vector: NETWORK
Access Complexity: LOW
Authentication: NONE
Confidentiality: NONE
Integrity: NONE
Availability: PARTIAL
  
Reference:
http://lists.grok.org.uk/pipermail/full-disclosure/2007-September/065892.html
BID-25726
SECUNIA-26876
OSVDB-40569
dibbler-invalidoption-dos(36685)
http://klub.com.pl/dhcpv6/
http://labs.musecurity.com/wp-content/uploads/2007/09/mu-200709-02.txt

CWE    1
CWE-119

© SecPod Technologies