#VU28217 Stack-based buffer overflow in OpenConnect VPN Client - CVE-2012-6128
Published: May 25, 2020
OpenConnect VPN Client
OpenConnect
Description
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error within http.c file when processing a long (1) hostname, (2) path, or (3) cookie list in a response. A remote attacker can trick the victim to connect to a malicious VPN server, trigger stack-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
Remediation
External links
- http://git.infradead.org/users/dwmw2/openconnect.git/commitdiff/26f752c3dbf69227679fc6bebb4ae071aecec491
- http://lists.opensuse.org/opensuse-updates/2013-06/msg00115.html
- http://www.debian.org/security/2013/dsa-2623
- http://www.infradead.org/openconnect/changelog.html
- http://www.mandriva.com/security/advisories?name=MDVSA-2013:108
- http://www.openwall.com/lists/oss-security/2013/02/12/7
- http://www.securityfocus.com/bid/57884
- https://exchange.xforce.ibmcloud.com/vulnerabilities/82058
- https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0060