Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-j83j-g9hw-7wvp

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Multiple stack-based buffer overflows in the __dn_expand function in network/dn_expand.c in musl libc 1.1x before 1.1.2 and 0.9.13 through 1.0.3 allow remote attackers to (1) have unspecified impact via an invalid name length in a DNS response or (2) cause a denial of service (crash) via an invalid name length in a DNS response, related to an infinite loop with no output.

Multiple stack-based buffer overflows in the __dn_expand function in network/dn_expand.c in musl libc 1.1x before 1.1.2 and 0.9.13 through 1.0.3 allow remote attackers to (1) have unspecified impact via an invalid name length in a DNS response or (2) cause a denial of service (crash) via an invalid name length in a DNS response, related to an infinite loop with no output.

EPSS

Процентиль: 82%
0.01794
Низкий

Связанные уязвимости

CVSS3: 9.8
ubuntu
почти 6 лет назад

Multiple stack-based buffer overflows in the __dn_expand function in network/dn_expand.c in musl libc 1.1x before 1.1.2 and 0.9.13 through 1.0.3 allow remote attackers to (1) have unspecified impact via an invalid name length in a DNS response or (2) cause a denial of service (crash) via an invalid name length in a DNS response, related to an infinite loop with no output.

CVSS3: 9.8
nvd
почти 6 лет назад

Multiple stack-based buffer overflows in the __dn_expand function in network/dn_expand.c in musl libc 1.1x before 1.1.2 and 0.9.13 through 1.0.3 allow remote attackers to (1) have unspecified impact via an invalid name length in a DNS response or (2) cause a denial of service (crash) via an invalid name length in a DNS response, related to an infinite loop with no output.

CVSS3: 9.8
debian
почти 6 лет назад

Multiple stack-based buffer overflows in the __dn_expand function in n ...

EPSS

Процентиль: 82%
0.01794
Низкий