Heap-based buffer overflow in Shim allows remote attackers to execute arbitrary code via a crafted IPv6 address, related to the "tftp:// DHCPv6 boot option."
The product writes data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
http://www.openwall.com/lists/oss-security/2014/10/13/4 | mailing list exploit |
http://www.securityfocus.com/bid/70409 | vdb entry third party advisory |
http://rhn.redhat.com/errata/RHSA-2014-1801.html | vendor advisory broken link |
https://exchange.xforce.ibmcloud.com/vulnerabilities/96988 | vdb entry third party advisory |