Описание
The vulnerability is caused by improper check for check if RDLENGTH does not overflow the buffer in response from DNS server.
The vulnerability is caused by improper check for check if RDLENGTH does not overflow the buffer in response from DNS server.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2023-32726
- https://lists.debian.org/debian-lts-announce/2024/01/msg00012.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BYSYLA7VTHR25CBLYO5ZLEJFGU7HTHQB
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UMFKNV5E4LG2DIZNPRWQ2ENH75H6UEQT
- https://support.zabbix.com/browse/ZBX-23855
Связанные уязвимости
CVSS3: 3.9
ubuntu
больше 1 года назад
The vulnerability is caused by improper check for check if RDLENGTH does not overflow the buffer in response from DNS server.
CVSS3: 3.9
nvd
больше 1 года назад
The vulnerability is caused by improper check for check if RDLENGTH does not overflow the buffer in response from DNS server.
CVSS3: 3.9
debian
больше 1 года назад
The vulnerability is caused by improper check for check if RDLENGTH do ...
CVSS3: 8.1
fstec
больше 1 года назад
Уязвимость компонента DNS Response Handler агента универсальной системы мониторинга Zabbix, позволяющая нарушителю вызвать переполнение буфера