Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2016-7069

Опубликовано: 11 сент. 2018
Источник: debian
EPSS Низкий

Описание

An issue has been found in dnsdist before 1.2.0 in the way EDNS0 OPT records are handled when parsing responses from a backend. When dnsdist is configured to add EDNS Client Subnet to a query, the response may contain an EDNS0 OPT record that has to be removed before forwarding the response to the initial client. On a 32-bit system, the pointer arithmetic used when parsing the received response to remove that record might trigger an undefined behavior leading to a crash.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
dnsdistfixed1.2.0-1package
dnsdistfixed1.1.0-2+deb9u1stretchpackage

Примечания

  • https://dnsdist.org/security-advisories/powerdns-advisory-for-dnsdist-2017-01.html

  • Patches: https://downloads.powerdns.com/patches/2017-01

EPSS

Процентиль: 3%
0.00016
Низкий

Связанные уязвимости

CVSS3: 5.9
ubuntu
больше 7 лет назад

An issue has been found in dnsdist before 1.2.0 in the way EDNS0 OPT records are handled when parsing responses from a backend. When dnsdist is configured to add EDNS Client Subnet to a query, the response may contain an EDNS0 OPT record that has to be removed before forwarding the response to the initial client. On a 32-bit system, the pointer arithmetic used when parsing the received response to remove that record might trigger an undefined behavior leading to a crash.

CVSS3: 5.9
nvd
больше 7 лет назад

An issue has been found in dnsdist before 1.2.0 in the way EDNS0 OPT records are handled when parsing responses from a backend. When dnsdist is configured to add EDNS Client Subnet to a query, the response may contain an EDNS0 OPT record that has to be removed before forwarding the response to the initial client. On a 32-bit system, the pointer arithmetic used when parsing the received response to remove that record might trigger an undefined behavior leading to a crash.

CVSS3: 7.5
github
больше 3 лет назад

An issue has been found in dnsdist before 1.2.0 in the way EDNS0 OPT records are handled when parsing responses from a backend. When dnsdist is configured to add EDNS Client Subnet to a query, the response may contain an EDNS0 OPT record that has to be removed before forwarding the response to the initial client. On a 32-bit system, the pointer arithmetic used when parsing the received response to remove that record might trigger an undefined behavior leading to a crash.

suse-cvrf
больше 2 лет назад

Security update for dnsdist

suse-cvrf
около 2 лет назад

Security update for dnsdist

EPSS

Процентиль: 3%
0.00016
Низкий