Vulnerability CVE-2007-5029


Published: 2007-09-21   Modified: 2012-02-12

Description:
Dibbler 0.6.0 does not verify that certain length parameters are appropriate for buffer sizes, which allows remote attackers to trigger a buffer over-read and cause a denial of service (daemon crash), as demonstrated by incorrect behavior of the TSrvMsg constructor in SrvMessages/SrvMsg.cpp when (1) reading the option code and option length and (2) parsing options.

Type:

CWE-20

(Improper Input Validation)

CVSS2 => (AV:N/AC:L/Au:N/C:N/I:N/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
5/10
2.9/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
None
None
Partial
Affected software
Dibbler -> Dibbler 

 References:
http://www.securityfocus.com/bid/25726
http://secunia.com/advisories/26876
http://labs.musecurity.com/wp-content/uploads/2007/09/mu-200709-02.txt
http://osvdb.org/40569
http://lists.grok.org.uk/pipermail/full-disclosure/2007-September/065892.html
http://xforce.iss.net/xforce/xfdb/36685

Copyright 2024, cxsecurity.com

 

Back to Top