Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2020-6073

Опубликовано: 24 мар. 2020
Источник: debian

Описание

An exploitable denial-of-service vulnerability exists in the TXT record-parsing functionality of Videolabs libmicrodns 0.1.0. When parsing the RDATA section in a TXT record in mDNS messages, multiple integer overflows can be triggered, leading to a denial of service. An attacker can send an mDNS message to trigger this vulnerability.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
libmicrodnsfixed0.2.0-1package
vlcfixed3.0.8-4package
vlcend-of-lifejessiepackage

Примечания

  • https://talosintelligence.com/vulnerability_reports/TALOS-2020-0996

  • These were addressed on the source level in 3.0.9, but 3.0.8-4 disables the plugin

Связанные уязвимости

CVSS3: 7.5
ubuntu
почти 6 лет назад

An exploitable denial-of-service vulnerability exists in the TXT record-parsing functionality of Videolabs libmicrodns 0.1.0. When parsing the RDATA section in a TXT record in mDNS messages, multiple integer overflows can be triggered, leading to a denial of service. An attacker can send an mDNS message to trigger this vulnerability.

CVSS3: 7.5
nvd
почти 6 лет назад

An exploitable denial-of-service vulnerability exists in the TXT record-parsing functionality of Videolabs libmicrodns 0.1.0. When parsing the RDATA section in a TXT record in mDNS messages, multiple integer overflows can be triggered, leading to a denial of service. An attacker can send an mDNS message to trigger this vulnerability.

CVSS3: 7.5
github
больше 3 лет назад

An exploitable denial-of-service vulnerability exists in the TXT record-parsing functionality of Videolabs libmicrodns 0.1.0. When parsing the RDATA section in a TXT record in mDNS messages, multiple integer overflows can be triggered, leading to a denial of service. An attacker can send an mDNS message to trigger this vulnerability.

CVSS3: 5.3
fstec
почти 6 лет назад

Уязвимость библиотеки microdns программы-медиапроигрывателя VideoLAN VLC, связанная с чтением данных за границами буфера в памяти, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код