Multiple integer overflows in Dibbler 0.6.0 allow remote attackers to cause a denial of service (daemon crash) via packets containing options with large lengths, which trigger attempts at excessive memory allocation, as demonstrated by (1) the TSrvMsg constructor in SrvMessages/SrvMsg.cpp; the (2) TClntMsg, (3) TClntOptIAAddress, (4) TClntOptIAPrefix, (5) TOptVendorSpecInfo, and (6) TOptOptionRequest constructors; and the (7) TRelIfaceMgr::decodeRelayRepl, (8) TRelMsg::decodeOpts, and (9) TSrvIfaceMgr::decodeRelayForw methods.
Weaknesses in this category are related to improper calculation or conversion of numbers.
Link | Tags |
---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/36684 | vdb entry |
http://lists.grok.org.uk/pipermail/full-disclosure/2007-September/065892.html | mailing list patch vendor advisory |
http://osvdb.org/40568 | vdb entry |
http://secunia.com/advisories/26876 | third party advisory patch vendor advisory |
http://klub.com.pl/dhcpv6/ | |
http://labs.musecurity.com/wp-content/uploads/2007/09/mu-200709-02.txt | patch |
http://www.securityfocus.com/bid/25726 | vdb entry patch |