Heap-based buffer overflow in OpenConnect VPN Client - CVE-2012-3291
Published: June 7, 2012 / Updated: August 11, 2020
OpenConnect VPN Client
Detailed vulnerability description
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error in Heap-based buffer overflow in OpenConnect 3.18. A remote attacker can use a crafted greeting banner. to trigger heap-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
How to mitigate CVE-2012-3291
Sources
- http://git.infradead.org/users/dwmw2/openconnect.git/commitdiff/14cae65318d3ef1f7d449e463b72b6934e82f1c2
- http://lists.fedoraproject.org/pipermail/package-announce/2012-May/079747.html
- http://lists.opensuse.org/opensuse-updates/2013-06/msg00186.html
- http://www.debian.org/security/2012/dsa-2495
- http://www.infradead.org/openconnect/changelog.html
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17242