Vulnerability Description
Dibbler 0.6.0 does not verify that certain length parameters are appropriate for buffer sizes, which allows remote attackers to trigger a buffer over-read and cause a denial of service (daemon crash), as demonstrated by incorrect behavior of the TSrvMsg constructor in SrvMessages/SrvMsg.cpp when (1) reading the option code and option length and (2) parsing options.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Dibbler | Dibbler | 0.6.0 |
Related Weaknesses (CWE)
References
- http://klub.com.pl/dhcpv6/
- http://labs.musecurity.com/wp-content/uploads/2007/09/mu-200709-02.txtPatch
- http://lists.grok.org.uk/pipermail/full-disclosure/2007-September/065892.html
- http://osvdb.org/40569
- http://secunia.com/advisories/26876PatchVendor Advisory
- http://www.securityfocus.com/bid/25726Patch
- https://exchange.xforce.ibmcloud.com/vulnerabilities/36685
- http://klub.com.pl/dhcpv6/
- http://labs.musecurity.com/wp-content/uploads/2007/09/mu-200709-02.txtPatch
- http://lists.grok.org.uk/pipermail/full-disclosure/2007-September/065892.html
- http://osvdb.org/40569
- http://secunia.com/advisories/26876PatchVendor Advisory
- http://www.securityfocus.com/bid/25726Patch
- https://exchange.xforce.ibmcloud.com/vulnerabilities/36685
FAQ
What is CVE-2007-5029?
CVE-2007-5029 is a vulnerability with a CVSS score of 5.0 (MEDIUM). Dibbler 0.6.0 does not verify that certain length parameters are appropriate for buffer sizes, which allows remote attackers to trigger a buffer over-read and cause a denial of service (daemon crash),...
How severe is CVE-2007-5029?
CVE-2007-5029 has been rated MEDIUM with a CVSS base score of 5.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2007-5029?
Check the references section above for vendor advisories and patch information. Affected products include: Dibbler Dibbler.