Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2017-1000381

Опубликовано: 07 июл. 2017
Источник: debian
EPSS Низкий

Описание

The c-ares function `ares_parse_naptr_reply()`, which is used for parsing NAPTR responses, could be triggered to read memory outside of the given input buffer if the passed in DNS response packet was crafted in a particular way.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
c-aresfixed1.12.0-4package
c-aresfixed1.12.0-1+deb9u1stretchpackage
c-aresfixed1.10.0-2+deb8u2jessiepackage

Примечания

  • https://c-ares.haxx.se/adv_20170620.html

  • Patch: https://c-ares.haxx.se/CVE-2017-1000381.patch

EPSS

Процентиль: 68%
0.006
Низкий

Связанные уязвимости

CVSS3: 7.5
ubuntu
почти 8 лет назад

The c-ares function `ares_parse_naptr_reply()`, which is used for parsing NAPTR responses, could be triggered to read memory outside of the given input buffer if the passed in DNS response packet was crafted in a particular way.

CVSS3: 6.5
redhat
около 8 лет назад

The c-ares function `ares_parse_naptr_reply()`, which is used for parsing NAPTR responses, could be triggered to read memory outside of the given input buffer if the passed in DNS response packet was crafted in a particular way.

CVSS3: 7.5
nvd
почти 8 лет назад

The c-ares function `ares_parse_naptr_reply()`, which is used for parsing NAPTR responses, could be triggered to read memory outside of the given input buffer if the passed in DNS response packet was crafted in a particular way.

suse-cvrf
почти 8 лет назад

Security update for libcares2

suse-cvrf
почти 8 лет назад

Security update for libcares2

EPSS

Процентиль: 68%
0.006
Низкий