Multiple integer overflows in Dibbler 0.6.0 allow remote attackers to cause a denial of service (daemon crash) via packets containing options with large lengths, which trigger attempts at excessive memory allocation, as demonstrated by (1) the TSrvMsg constructor in SrvMessages/SrvMsg.cpp; the (2) TClntMsg, (3) TClntOptIAAddress, (4) TClntOptIAPrefix, (5) TOptVendorSpecInfo, and (6) TOptOptionRequest constructors; and the (7) TRelIfaceMgr::decodeRelayRepl, (8) TRelMsg::decodeOpts, and (9) TSrvIfaceMgr::decodeRelayForw methods.
References
Configurations
History
No history.
Information
Published : 2007-09-21 19:17
Updated : 2024-02-04 17:13
NVD link : CVE-2007-5030
Mitre link : CVE-2007-5030
CVE.ORG link : CVE-2007-5030
JSON object : View
Products Affected
dibbler
- dibbler
CWE
CWE-189
Numeric Errors