Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2017-15650

Опубликовано: 19 окт. 2017
Источник: debian
EPSS Низкий

Описание

musl libc before 1.1.17 has a buffer overflow via crafted DNS replies because dns_parse_callback in network/lookup_name.c does not restrict the number of addresses, and thus an attacker can provide an unexpected number by sending A records in a reply to an AAAA query.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
muslfixed1.1.17-1package
muslno-dsastretchpackage
muslno-dsajessiepackage

Примечания

  • https://git.musl-libc.org/cgit/musl/patch/?id=45ca5d3fcb6f874bf5ba55d0e9651cef68515395

EPSS

Процентиль: 70%
0.0063
Низкий

Связанные уязвимости

CVSS3: 7.5
ubuntu
больше 8 лет назад

musl libc before 1.1.17 has a buffer overflow via crafted DNS replies because dns_parse_callback in network/lookup_name.c does not restrict the number of addresses, and thus an attacker can provide an unexpected number by sending A records in a reply to an AAAA query.

CVSS3: 7.5
nvd
больше 8 лет назад

musl libc before 1.1.17 has a buffer overflow via crafted DNS replies because dns_parse_callback in network/lookup_name.c does not restrict the number of addresses, and thus an attacker can provide an unexpected number by sending A records in a reply to an AAAA query.

CVSS3: 7.5
github
больше 3 лет назад

musl libc before 1.1.17 has a buffer overflow via crafted DNS replies because dns_parse_callback in network/lookup_name.c does not restrict the number of addresses, and thus an attacker can provide an unexpected number by sending A records in a reply to an AAAA query.

CVSS3: 7.5
fstec
больше 8 лет назад

Уязвимость функции dns_parse_callback в network/lookup_name.c библиотеки для языка Си для операционных систем на основе ядра операционных систем Linux Musl, позволяющая нарушителю вызвать отказ в обслуживании

EPSS

Процентиль: 70%
0.0063
Низкий