Required CVE Record Information
Description
Multiple integer overflows in Dibbler 0.6.0 allow remote attackers to cause a denial of service (daemon crash) via packets containing options with large lengths, which trigger attempts at excessive memory allocation, as demonstrated by (1) the TSrvMsg constructor in SrvMessages/SrvMsg.cpp; the (2) TClntMsg, (3) TClntOptIAAddress, (4) TClntOptIAPrefix, (5) TOptVendorSpecInfo, and (6) TOptOptionRequest constructors; and the (7) TRelIfaceMgr::decodeRelayRepl, (8) TRelMsg::decodeOpts, and (9) TSrvIfaceMgr::decodeRelayForw methods.
References 7 Total
- exchange.xforce.ibmcloud.com: dibbler-optionlength-dos(36684) vdb-entry
- lists.grok.org.uk: 20070918 [MU-200709-02] Dibbler Remote Denial of Service Vulnerability mailing-list
- osvdb.org: 40568 vdb-entry
- secunia.com: 26876 third-party-advisory
- http://klub.com.pl/dhcpv6/
- http://labs.musecurity.com/wp-content/uploads/2007/09/mu-200709-02.txt
- securityfocus.com: 25726 vdb-entry
Updated:
This container includes required additional information provided by the CVE Program for this vulnerability.
References 7 Total
- exchange.xforce.ibmcloud.com: dibbler-optionlength-dos(36684) vdb-entryx_transferred
- lists.grok.org.uk: 20070918 [MU-200709-02] Dibbler Remote Denial of Service Vulnerability mailing-listx_transferred
- osvdb.org: 40568 vdb-entryx_transferred
- secunia.com: 26876 third-party-advisoryx_transferred
- http://klub.com.pl/dhcpv6/ x_transferred
- http://labs.musecurity.com/wp-content/uploads/2007/09/mu-200709-02.txt x_transferred
- securityfocus.com: 25726 vdb-entryx_transferred