Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-f296-f6r3-pgjg

Опубликовано: 02 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The response_addname function in response.c in Daniel J. Bernstein djbdns 1.05 and earlier does not constrain offsets in the required manner, which allows remote attackers, with control over a third-party subdomain served by tinydns and axfrdns, to trigger DNS responses containing arbitrary records via crafted zone data for this subdomain.

The response_addname function in response.c in Daniel J. Bernstein djbdns 1.05 and earlier does not constrain offsets in the required manner, which allows remote attackers, with control over a third-party subdomain served by tinydns and axfrdns, to trigger DNS responses containing arbitrary records via crafted zone data for this subdomain.

EPSS

Процентиль: 94%
0.12823
Средний

Дефекты

CWE-20

Связанные уязвимости

ubuntu
почти 17 лет назад

The response_addname function in response.c in Daniel J. Bernstein djbdns 1.05 and earlier does not constrain offsets in the required manner, which allows remote attackers, with control over a third-party subdomain served by tinydns and axfrdns, to trigger DNS responses containing arbitrary records via crafted zone data for this subdomain.

nvd
почти 17 лет назад

The response_addname function in response.c in Daniel J. Bernstein djbdns 1.05 and earlier does not constrain offsets in the required manner, which allows remote attackers, with control over a third-party subdomain served by tinydns and axfrdns, to trigger DNS responses containing arbitrary records via crafted zone data for this subdomain.

debian
почти 17 лет назад

The response_addname function in response.c in Daniel J. Bernstein djb ...

EPSS

Процентиль: 94%
0.12823
Средний

Дефекты

CWE-20