CVE-2011-4093
Published Feb 10, 2014
Last updated 2 years ago
Overview
- Description
- Integer overflow in inc/server.hpp in libnet6 (aka net6) before 1.3.14 might allow remote attackers to hijack connections and gain privileges as other users by making a large number of connections until the overflow occurs and an ID of another user is provided.
- Source
- secalert@redhat.com
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 5.8
- Impact score
- 4.9
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:P/I:P/A:N
Weaknesses
- nvd@nist.gov
- CWE-190
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:oracle:solaris:11.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0B1C288F-326B-497B-B26C-D26E01262DDB" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:armin_burgmeier:net6:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B580F7EF-BD7D-464F-ADEF-C387353D1C7A", "versionEndIncluding": "1.3.13" }, { "criteria": "cpe:2.3:a:armin_burgmeier:net6:1.3.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "75B0D417-BF61-45D1-AC4C-8E4753250BB4" }, { "criteria": "cpe:2.3:a:armin_burgmeier:net6:1.3.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F3E379A0-1F9E-46EF-8189-43D22BC5FA00" }, { "criteria": "cpe:2.3:a:armin_burgmeier:net6:1.3.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "71AD53FD-CF00-4D25-B8E0-738324135815" }, { "criteria": "cpe:2.3:a:armin_burgmeier:net6:1.3.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EB3767D8-BF27-4DA6-B630-BAE0EF2D80CD" }, { "criteria": "cpe:2.3:a:armin_burgmeier:net6:1.3.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E44789AE-A92A-49E1-B820-C8208458D72F" }, { "criteria": "cpe:2.3:a:armin_burgmeier:net6:1.3.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FD774656-6E58-4CC5-8D52-4D3D0EC2C4B1" }, { "criteria": "cpe:2.3:a:armin_burgmeier:net6:1.3.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5E21AE2C-493D-44CC-8B17-A55E1FEDD39B" }, { "criteria": "cpe:2.3:a:armin_burgmeier:net6:1.3.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AABB6CDB-27E1-4B59-8A72-D0D644929AA7" }, { "criteria": "cpe:2.3:a:armin_burgmeier:net6:1.3.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FD481E91-BBA1-474F-B5A0-EF3B145412A0" }, { "criteria": "cpe:2.3:a:armin_burgmeier:net6:1.3.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DDA498A1-D08C-4AA3-8849-6CCBBE306277" }, { "criteria": "cpe:2.3:a:armin_burgmeier:net6:1.3.11:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1C46815A-FF74-4C27-8AA6-6422FE4F695F" }, { "criteria": "cpe:2.3:a:armin_burgmeier:net6:1.3.12:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6A425163-5F20-4980-93B9-B433F0F79FD6" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5646FDE9-CF21-46A9-B89D-F5BBDB4249AF" }, { "criteria": "cpe:2.3:o:opensuse_project:opensuse:11.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EE8EFFB8-9411-4826-9BFC-A06BA042FC30" } ], "operator": "OR" } ] } ]