First published: Sun Feb 24 2013(Updated: )
Multiple stack-based buffer overflows in http.c in OpenConnect before 4.08 allow remote VPN gateways to cause a denial of service (application crash) via a long (1) hostname, (2) path, or (3) cookie list in a response.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
infradead OpenConnect | <=4.07 | |
infradead OpenConnect | =1.00 | |
infradead OpenConnect | =1.10 | |
infradead OpenConnect | =1.20 | |
infradead OpenConnect | =1.30 | |
infradead OpenConnect | =1.40 | |
infradead OpenConnect | =2.00 | |
infradead OpenConnect | =2.01 | |
infradead OpenConnect | =2.10 | |
infradead OpenConnect | =2.11 | |
infradead OpenConnect | =2.12 | |
infradead OpenConnect | =2.20 | |
infradead OpenConnect | =2.21 | |
infradead OpenConnect | =2.22 | |
infradead OpenConnect | =2.23 | |
infradead OpenConnect | =2.24 | |
infradead OpenConnect | =2.25 | |
infradead OpenConnect | =2.26 | |
infradead OpenConnect | =3.00 | |
infradead OpenConnect | =3.01 | |
infradead OpenConnect | =3.02 | |
infradead OpenConnect | =3.11 | |
infradead OpenConnect | =3.12 | |
infradead OpenConnect | =3.13 | |
infradead OpenConnect | =3.14 | |
infradead OpenConnect | =3.15 | |
infradead OpenConnect | =3.16 | |
infradead OpenConnect | =3.17 | |
infradead OpenConnect | =3.18 | |
infradead OpenConnect | =3.19 | |
infradead OpenConnect | =3.20 | |
infradead OpenConnect | =3.99 | |
infradead OpenConnect | =4.00 | |
infradead OpenConnect | =4.01 | |
infradead OpenConnect | =4.02 | |
infradead OpenConnect | =4.03 | |
infradead OpenConnect | =4.04 | |
infradead OpenConnect | =4.05 | |
infradead OpenConnect | =4.06 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-6128 is classified as having a high severity due to the potential for denial of service and application crashes.
To fix CVE-2012-6128, you should update OpenConnect to version 4.08 or later.
CVE-2012-6128 affects multiple versions of OpenConnect prior to version 4.08.
CVE-2012-6128 is a stack-based buffer overflow vulnerability.
Yes, CVE-2012-6128 can be exploited remotely by sending specifically crafted long hostnames, paths, or cookie lists.