Описание
The vulnerability is caused by improper check for check if RDLENGTH does not overflow the buffer in response from DNS server.
The vulnerability is caused by improper check for check if RDLENGTH does not overflow the buffer in response from DNS server.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2023-32726
- https://lists.debian.org/debian-lts-announce/2024/01/msg00012.html
- https://lists.debian.org/debian-lts-announce/2024/10/msg00000.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BYSYLA7VTHR25CBLYO5ZLEJFGU7HTHQB
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UMFKNV5E4LG2DIZNPRWQ2ENH75H6UEQT
- https://support.zabbix.com/browse/ZBX-23855
Связанные уязвимости
CVSS3: 3.9
ubuntu
почти 2 года назад
The vulnerability is caused by improper check for check if RDLENGTH does not overflow the buffer in response from DNS server.
CVSS3: 3.9
nvd
почти 2 года назад
The vulnerability is caused by improper check for check if RDLENGTH does not overflow the buffer in response from DNS server.
CVSS3: 3.9
debian
почти 2 года назад
The vulnerability is caused by improper check for check if RDLENGTH do ...
CVSS3: 8.1
fstec
почти 2 года назад
Уязвимость компонента DNS Response Handler агента универсальной системы мониторинга Zabbix, позволяющая нарушителю вызвать переполнение буфера