First published: Fri Jul 11 2014(Updated: )
libndp provides a library for the IPv6 Neighbor Discovery Protocol. A buffer overflow flaw was found in the ndp_msg_opt_dnssl_domain() function when handling the DNS Search List (DNSSL) in IPv6 router advertisements. A malicious router or man-in-the-middle attacker could use this flaw to cause an application using libndp to crash or, potentially, execute arbitrary code.
Affected Software | Affected Version | How to fix |
---|---|---|
SUSE Libndp |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1118583 is high due to the potential for remote code execution by exploiting a buffer overflow flaw.
To fix REDHAT-BUG-1118583, upgrade to the latest version of libndp that addresses the buffer overflow vulnerability.
REDHAT-BUG-1118583 can allow an attacker to execute arbitrary code remotely, compromising the affected system's security.
Individuals and organizations using libndp for IPv6 functionality may be affected by REDHAT-BUG-1118583.
Currently, the recommended approach for REDHAT-BUG-1118583 is to apply the available security updates instead of relying on workarounds.