Package: dibbler
Severity: grave
Tags: security
Justification: user security hole

Hi

There are three CVEs issued for dibbler.

CVE-2007-5028:

Dibbler 0.6.0 on Linux uses weak world-writable permissions for
unspecified files in /var/lib/dibbler, which has unknown impact and
local attack vectors.


CVE-2007-5029:

Dibbler 0.6.0 does not verify that certain length parameters are
appropriate for buffer sizes, which allows remote attackers to trigger a
buffer over-read and cause a denial of service (daemon crash), as
demonstrated by incorrect behavior of the TSrvMsg constructor in
SrvMessages/SrvMsg.cpp when (1) reading the option code and option
length and (2) parsing options. 


CVE-2007-5030:

Multiple integer overflows in Dibbler 0.6.0 allow remote attackers to
cause a denial of service (daemon crash) via packets containing options
with large lengths, which trigger attempts at excessive memory
allocation, as demonstrated by (1) the TSrvMsg constructor in
SrvMessages/SrvMsg.cpp; the (2) TClntMsg, (3) TClntOptIAAddress, (4)
TClntOptIAPrefix, (5) TOptVendorSpecInfo, and (6) TOptOptionRequest
constructors; and the (7) TRelIfaceMgr::decodeRelayRepl, (8)
TRelMsg::decodeOpts, and (9) TSrvIfaceMgr::decodeRelayForw methods. 



There might be some other fixes in the new 0.6.1 version, according to
the upstream CHANGELOG. I am still looking at the source code to
separate them. Could you please consider packaging the new upstream
version to fix these issues and please mention the CVE numbers in the
changelog.
Thanks for your efforts

Cheers
Steffen



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to