Integer overflow in inc/server.hpp in libnet6 (aka net6) before 1.3.14 might allow remote attackers to hijack connections and gain privileges as other users by making a large number of connections until the overflow occurs and an ID of another user is provided.
References
Link | Resource |
---|---|
http://git.0x539.de/?p=net6.git%3Ba=commitdiff%3Bh=ac61d7fb42a1f977fb527e024bede319c4a9e169%3Bhp=08c8e2261604c6fcbbaf62f9ae9d13f7015fcb9a | |
http://lists.opensuse.org/opensuse-updates/2012-01/msg00044.html | Third Party Advisory |
http://lists.opensuse.org/opensuse-updates/2012-01/msg00054.html | Third Party Advisory |
http://www.openwall.com/lists/oss-security/2011/10/31/1 | Third Party Advisory |
http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html | Third Party Advisory |
https://bugzilla.novell.com/show_bug.cgi?id=727710 | Issue Tracking Third Party Advisory VDB Entry |
https://bugzilla.redhat.com/show_bug.cgi?id=750631 | Issue Tracking Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
No history.
Information
Published : 2014-02-10 18:15
Updated : 2024-02-04 18:35
NVD link : CVE-2011-4093
Mitre link : CVE-2011-4093
CVE.ORG link : CVE-2011-4093
JSON object : View
Products Affected
armin_burgmeier
- net6
oracle
- solaris
opensuse_project
- opensuse
opensuse
- opensuse
CWE
CWE-190
Integer Overflow or Wraparound