Vulnerability Details : CVE-2011-4093
Integer overflow in inc/server.hpp in libnet6 (aka net6) before 1.3.14 might allow remote attackers to hijack connections and gain privileges as other users by making a large number of connections until the overflow occurs and an ID of another user is provided.
Vulnerability category: Overflow
Products affected by CVE-2011-4093
- cpe:2.3:o:oracle:solaris:11.2:*:*:*:*:*:*:*
- cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
- cpe:2.3:a:armin_burgmeier:net6:*:*:*:*:*:*:*:*
- cpe:2.3:a:armin_burgmeier:net6:1.3.2:*:*:*:*:*:*:*
- cpe:2.3:a:armin_burgmeier:net6:1.3.9:*:*:*:*:*:*:*
- cpe:2.3:a:armin_burgmeier:net6:1.3.11:*:*:*:*:*:*:*
- cpe:2.3:a:armin_burgmeier:net6:1.3.4:*:*:*:*:*:*:*
- cpe:2.3:a:armin_burgmeier:net6:1.3.5:*:*:*:*:*:*:*
- cpe:2.3:a:armin_burgmeier:net6:1.3.6:*:*:*:*:*:*:*
- cpe:2.3:a:armin_burgmeier:net6:1.3.7:*:*:*:*:*:*:*
- cpe:2.3:a:armin_burgmeier:net6:1.3.12:*:*:*:*:*:*:*
- cpe:2.3:a:armin_burgmeier:net6:1.3.1:*:*:*:*:*:*:*
- cpe:2.3:a:armin_burgmeier:net6:1.3.3:*:*:*:*:*:*:*
- cpe:2.3:a:armin_burgmeier:net6:1.3.8:*:*:*:*:*:*:*
- cpe:2.3:a:armin_burgmeier:net6:1.3.10:*:*:*:*:*:*:*
- cpe:2.3:o:opensuse_project:opensuse:11.4:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2011-4093
0.42%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 74 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2011-4093
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.8
|
MEDIUM | AV:N/AC:M/Au:N/C:P/I:P/A:N |
8.6
|
4.9
|
NIST |
CWE ids for CVE-2011-4093
-
The product performs a calculation that can produce an integer overflow or wraparound when the logic assumes that the resulting value will always be larger than the original value. This occurs when an integer value is incremented to a value that is too large to store in the associated representation. When this occurs, the value may become a very small or negative number.Assigned by: nvd@nist.gov (Primary)
References for CVE-2011-4093
-
https://bugzilla.novell.com/show_bug.cgi?id=727710
Bug 727710 – VUL-0: net6 connection hijackingIssue Tracking;Third Party Advisory;VDB Entry
-
http://www.openwall.com/lists/oss-security/2011/10/31/1
oss-security - Re: CVE request: 3 flaws in libobby and libnet6Third Party Advisory
-
http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
Oracle Solaris Third Party Bulletin - April 2015Third Party Advisory
-
http://lists.opensuse.org/opensuse-updates/2012-01/msg00044.html
openSUSE-SU-2012:0008-1: moderate: net6Third Party Advisory
-
https://bugzilla.redhat.com/show_bug.cgi?id=750631
750631 – (CVE-2011-4093) CVE-2011-4093 net6: integer overflow may lead to connection hijackingIssue Tracking;Third Party Advisory;VDB Entry
-
http://lists.opensuse.org/opensuse-updates/2012-01/msg00054.html
openSUSE-SU-2012:0040-1: moderate: net6Third Party Advisory
-
http://git.0x539.de/?p=net6.git%3Ba=commitdiff%3Bh=ac61d7fb42a1f977fb527e024bede319c4a9e169%3Bhp=08c8e2261604c6fcbbaf62f9ae9d13f7015fcb9a
Apache2 Ubuntu Default Page: It works
Jump to