Input validation error in fwknop - CVE-2012-4435
Published: October 23, 2012 / Updated: August 11, 2020
Vulnerability identifier: #VU43385
CSH Severity: Low
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2012-4435
CWE-ID: CWE-20
Exploitation vector: Remote access
Exploit availability:
No public exploit available
Vendor: www.cipherdyne.org
Affected software:
fwknop
fwknop
Detailed vulnerability description
The vulnerability allows a remote #AU# to perform service disruption.
fwknop before 2.0.3 does not properly validate IP addresses, which allows remote authenticated users to cause a denial of service (server crash) via a long IP address.
How to mitigate CVE-2012-4435
Install update from vendor's website.
Sources
- http://www.cipherdyne.org/blog/2012/09/software-release-fwknop-2.0.3.html
- http://www.cipherdyne.org/cgi-bin/gitweb.cgi?p=fwknop.git;a=commitdiff;h=263fa01f2af1d336961df320f1c7a9ea84ddac9a
- http://www.cipherdyne.org/cgi-bin/gitweb.cgi?p=fwknop.git;a=commitdiff;h=f4c16bc47fc24a96b63105556b62d61c1ba7d799
- http://www.openwall.com/lists/oss-security/2012/09/19/2
- http://www.openwall.com/lists/oss-security/2012/09/20/2
- http://www.openwall.com/lists/oss-security/2012/09/20/4
- https://exchange.xforce.ibmcloud.com/vulnerabilities/79568