Upstream information

CVE-2012-6128 at MITRE

Description

Multiple stack-based buffer overflows in http.c in OpenConnect before 4.08 allow remote VPN gateways to cause a denial of service (application crash) via a long (1) hostname, (2) path, or (3) cookie list in a response.

SUSE information

CVSS v2 Scores
  National Vulnerability Database
Base Score 4.96
Vector AV:N/AC:L/Au:N/C:N/I:N/A:P
Access Vector Network
Access Complexity Low
Authentication None
Confidentiality Impact None
Integrity Impact None
Availability Impact Partial
SUSE Bugzilla entry: 803347 [RESOLVED / FIXED]

SUSE Security Advisories:

List of released packages

Product(s) Fixed package version(s) References
openSUSE 12.3
  • openconnect >= 4.08-3.4.1
  • openconnect-debuginfo >= 4.08-3.4.1
  • openconnect-debugsource >= 4.08-3.4.1
  • openconnect-devel >= 4.08-3.4.1
  • openconnect-doc >= 4.08-3.4.1
  • openconnect-lang >= 4.08-3.4.1
Patchnames:
openSUSE-2013-429
openSUSE 13.2
  • openconnect >= 6.00-3.1.3
  • openconnect-devel >= 6.00-3.1.3
Patchnames:
openSUSE 13.2 GA openconnect
openSUSE Leap 42.1
  • openconnect >= 7.06-2.2
  • openconnect-devel >= 7.06-2.2
Patchnames:
openSUSE Leap 42.1 GA openconnect
openSUSE Leap 42.2
  • openconnect >= 7.06-3.4
  • openconnect-devel >= 7.06-3.4
Patchnames:
openSUSE Leap 42.2 GA openconnect