Integer overflow in inc/server.hpp in libnet6 (aka net6) before 1.3.14 might allow remote attackers to hijack connections and gain privileges as other users by making a large number of connections until the overflow occurs and an ID of another user is provided.
References
Link | Resource |
---|---|
http://www.openwall.com/lists/oss-security/2011/10/31/1 | Third Party Advisory |
https://bugzilla.novell.com/show_bug.cgi?id=727710 | Issue Tracking Third Party Advisory VDB Entry |
http://lists.opensuse.org/opensuse-updates/2012-01/msg00044.html | Third Party Advisory |
http://lists.opensuse.org/opensuse-updates/2012-01/msg00054.html | Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=750631 | Issue Tracking Third Party Advisory VDB Entry |
http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html | Third Party Advisory |
http://git.0x539.de/?p=net6.git%3Ba=commitdiff%3Bh=ac61d7fb42a1f977fb527e024bede319c4a9e169%3Bhp=08c8e2261604c6fcbbaf62f9ae9d13f7015fcb9a |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Information
Published : 2014-02-10 10:15
Updated : 2023-02-12 17:21
NVD link : CVE-2011-4093
Mitre link : CVE-2011-4093
JSON object : View
CWE
CWE-190
Integer Overflow or Wraparound
Products Affected
opensuse_project
- opensuse
armin_burgmeier
- net6
opensuse
- opensuse
oracle
- solaris