CVE-2014-3676

Impact:
Moderate
Public Date:
2014-10-13
CWE:
CWE-122
Bugzilla:
1148231: CVE-2014-3676 shim: heap-based buffer overflow flaw in IPv6 address parsing
A heap-based buffer overflow flaw was found the way shim parsed certain IPv6 addresses. If IPv6 network booting was enabled, a malicious server could supply a crafted IPv6 address that would cause shim to crash or, potentially, execute arbitrary code.

Find out more about CVE-2014-3676 from the MITRE CVE dictionary dictionary and NIST NVD.

CVSS v2 metrics

Base Score 5.8
Base Metrics AV:A/AC:L/Au:N/C:P/I:P/A:P
Access Vector Adjacent Network
Access Complexity Low
Authentication None
Confidentiality Impact Partial
Integrity Impact Partial
Availability Impact Partial

Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).

Red Hat Security Errata

Platform Errata Release Date
Red Hat Enterprise Linux 7 (shim) RHSA-2014:1801 2014-11-04

Acknowledgements

Red Hat would like to thank the SUSE Security Team for reporting this issue.

Last Modified
Close

Welcome! Check out the Getting Started with Red Hat page for quick tours and guides for common tasks.