An exploitable denial of service vulnerability exists in the freeDiameter functionality of freeDiameter 1.3.2. A specially crafted Diameter request can trigger a memory corruption resulting in denial-of-service. An attacker can send a malicious packet to trigger this vulnerability.
The product subtracts one value from another, such that the result is less than the minimum allowable integer value, which produces a value that is not equal to the correct result.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Freediameter | Freediameter | 1.3.2 (including) | 1.3.2 (including) |
Freediameter | Ubuntu | groovy | * |
Freediameter | Ubuntu | hirsute | * |
Freediameter | Ubuntu | impish | * |
Freediameter | Ubuntu | kinetic | * |
Freediameter | Ubuntu | lunar | * |
Freediameter | Ubuntu | mantic | * |
Freediameter | Ubuntu | trusty | * |