Multiple integer overflows in Dibbler 0.6.0 allow remote attackers to cause a denial of service (daemon crash) via packets containing options with large lengths, which trigger attempts at excessive memory allocation, as demonstrated by (1) the TSrvMsg constructor in SrvMessages/SrvMsg.cpp; the (2) TClntMsg, (3) TClntOptIAAddress, (4) TClntOptIAPrefix, (5) TOptVendorSpecInfo, and (6) TOptOptionRequest constructors; and the (7) TRelIfaceMgr::decodeRelayRepl, (8) TRelMsg::decodeOpts, and (9) TSrvIfaceMgr::decodeRelayForw methods.
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: mitre
Published: 2007-09-21T18:00:00
Updated: 2024-08-07T15:17:27.802Z
Reserved: 2007-09-21T00:00:00
Link: CVE-2007-5030
Vulnrichment
No data.
NVD
Status : Modified
Published: 2007-09-21T19:17:00.000
Modified: 2024-11-21T00:36:58.827
Link: CVE-2007-5030
Redhat
No data.