GNU Gatekeeper before 3.1 does not limit the number of connections to the status port, which allows remote attackers to cause a denial of service (connection and thread consumption) via a large number of connections.
References
Link | Resource |
---|---|
http://www.gnugk.org/gnugk-3.1.html | Vendor Advisory |
http://www.openwall.com/lists/oss-security/2012/08/25/4 | Third Party Advisory |
http://www.openwall.com/lists/oss-security/2012/08/25/3 | Third Party Advisory |
http://www.securityfocus.com/bid/55198 | Third Party Advisory VDB Entry |
http://secunia.com/advisories/50343 | Permissions Required Vendor Advisory |
http://www.openwall.com/lists/oss-security/2012/08/27/1 | Third Party Advisory |
http://www.osvdb.org/84862 | Broken Link |
http://lists.opensuse.org/opensuse-updates/2016-07/msg00070.html | Third Party Advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/77975 |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Information
Published : 2012-08-31 13:55
Updated : 2018-10-30 09:27
NVD link : CVE-2012-3534
Mitre link : CVE-2012-3534
JSON object : View
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
Products Affected
gnugk
- gnu_gatekeeper
opensuse
- opensuse
- leap