Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2017-9430

Опубликовано: 05 июн. 2017
Источник: debian

Описание

Stack-based buffer overflow in dnstracer through 1.9 allows attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a command line with a long name argument that is mishandled in a strcpy call for argv[0]. An example threat model is a web application that launches dnstracer with an untrusted name string.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
dnstracerunfixedpackage

Примечания

  • Crash in CLI tool, disputable if any exposed service makes use of dnstrace.

  • One scenario would be to have a web application that launches dnstracer

  • with user supplied name strings to evaluate.

Связанные уязвимости

CVSS3: 9.8
ubuntu
больше 8 лет назад

Stack-based buffer overflow in dnstracer through 1.9 allows attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a command line with a long name argument that is mishandled in a strcpy call for argv[0]. An example threat model is a web application that launches dnstracer with an untrusted name string.

CVSS3: 9.8
nvd
больше 8 лет назад

Stack-based buffer overflow in dnstracer through 1.9 allows attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a command line with a long name argument that is mishandled in a strcpy call for argv[0]. An example threat model is a web application that launches dnstracer with an untrusted name string.

CVSS3: 9.8
github
больше 3 лет назад

Stack-based buffer overflow in dnstracer through 1.9 allows attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a command line with a long name argument that is mishandled in a strcpy call for argv[0]. An example threat model is a web application that launches dnstracer with an untrusted name string.