LWN.net Logo

openconnect: code execution

Package(s):openconnect CVE #(s):CVE-2012-6128
Created:February 15, 2013 Updated:February 25, 2013
Description:

From the Mageia advisory:

A stack-based buffer overflow flaw was found in the way OpenConnect, a client for Cisco's "AnyConnect" VPN, performed processing of certain host names, paths, or cookie lists, received from the VPN gateway. A remote VPN gateway could provide a specially-crafted host name, path or cookie list that, when processed by the openconnect client would lead to openconnect executable crash.

Alerts:
Debian DSA-2623-1 2013-02-14
Mageia MGASA-2013-0060 2013-02-21
Fedora FEDORA-2013-2498 2013-02-24
Fedora FEDORA-2013-2472 2013-02-24

(Log in to post comments)

Copyright © 2013, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds