Integer overflow in inc/server.hpp in libnet6 (aka net6) before 1.3.14 might allow remote attackers to hijack connections and gain privileges as other users by making a large number of connections until the overflow occurs and an ID of another user is provided.
The product performs a calculation that can produce an integer overflow or wraparound when the logic assumes that the resulting value will always be larger than the original value. This occurs when an integer value is incremented to a value that is too large to store in the associated representation. When this occurs, the value may become a very small or negative number.
Link | Tags |
---|---|
https://bugzilla.novell.com/show_bug.cgi?id=727710 | issue tracking vdb entry third party advisory |
http://git.0x539.de/?p=net6.git%3Ba=commitdiff%3Bh=ac61d7fb42a1f977fb527e024bede319c4a9e169%3Bhp=08c8e2261604c6fcbbaf62f9ae9d13f7015fcb9a | |
https://bugzilla.redhat.com/show_bug.cgi?id=750631 | issue tracking vdb entry third party advisory |
http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html | third party advisory |
http://lists.opensuse.org/opensuse-updates/2012-01/msg00044.html | third party advisory vendor advisory |
http://lists.opensuse.org/opensuse-updates/2012-01/msg00054.html | third party advisory vendor advisory |
http://www.openwall.com/lists/oss-security/2011/10/31/1 | third party advisory mailing list |