Multiple integer overflows in Dibbler 0.6.0 allow remote attackers to cause a denial of service (daemon crash) via packets containing options with large lengths, which trigger attempts at excessive memory allocation, as demonstrated by (1) the TSrvMsg constructor in SrvMessages/SrvMsg.cpp; the (2) TClntMsg, (3) TClntOptIAAddress, (4) TClntOptIAPrefix, (5) TOptVendorSpecInfo, and (6) TOptOptionRequest constructors; and the (7) TRelIfaceMgr::decodeRelayRepl, (8) TRelMsg::decodeOpts, and (9) TSrvIfaceMgr::decodeRelayForw methods.
References
Configurations
Information
Published : 2007-09-21 12:17
Updated : 2017-07-28 18:33
NVD link : CVE-2007-5030
Mitre link : CVE-2007-5030
JSON object : View
CWE
CWE-189
Numeric Errors
Products Affected
dibbler
- dibbler