|
|
Log in / Subscribe / Register

openconnect: code execution

Package(s):openconnect CVE #(s):CVE-2012-6128
Created:February 15, 2013 Updated:May 19, 2014
Description:

From the Mageia advisory:

A stack-based buffer overflow flaw was found in the way OpenConnect, a client for Cisco's "AnyConnect" VPN, performed processing of certain host names, paths, or cookie lists, received from the VPN gateway. A remote VPN gateway could provide a specially-crafted host name, path or cookie list that, when processed by the openconnect client would lead to openconnect executable crash.

Alerts:
Gentoo 201405-18 openconnect 2014-05-18
openSUSE openSUSE-SU-2013:0979-1 openconnect 2013-06-10
Mandriva MDVSA-2013:108 openconnect 2013-04-10
Fedora FEDORA-2013-2472 openconnect 2013-02-24
Fedora FEDORA-2013-2498 openconnect 2013-02-24
Mageia MGASA-2013-0060 openconnect 2013-02-21
Debian DSA-2623-1 openconnect 2013-02-14

to post comments


Copyright © 2026, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds