CVE-2012-6128

NameCVE-2012-6128
DescriptionMultiple stack-based buffer overflows in http.c in OpenConnect before 4.08 allow remote VPN gateways to cause a denial of service (application crash) via a long (1) hostname, (2) path, or (3) cookie list in a response.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDSA-2623-1
Debian Bugs700794

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
openconnect (PTS)jessie, jessie (lts)6.00-2+deb8u2fixed
stretch (security), stretch (lts), stretch7.08-1+deb9u1fixed
buster (security), buster, buster (lts)8.02-1+deb10u1fixed
bullseye8.10-2fixed
bookworm9.01-3fixed
sid, trixie9.12-3fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
openconnectsourcesqueeze2.25-0.1+squeeze2DSA-2623-1
openconnectsource(unstable)3.20-3700794

Notes

http://git.infradead.org/users/dwmw2/openconnect.git/commitdiff/26f752c3dbf69227679fc6bebb4ae071aecec491
The fix seems to introduce a possible memory leak as regression, see BTS #700805

Search for package or bug name: Reporting problems