Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2014-3484

Опубликовано: 20 фев. 2020
Источник: nvd
CVSS3: 9.8
CVSS2: 7.5
EPSS Низкий

Описание

Multiple stack-based buffer overflows in the __dn_expand function in network/dn_expand.c in musl libc 1.1x before 1.1.2 and 0.9.13 through 1.0.3 allow remote attackers to (1) have unspecified impact via an invalid name length in a DNS response or (2) cause a denial of service (crash) via an invalid name length in a DNS response, related to an infinite loop with no output.

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:musl-libc:musl:*:*:*:*:*:*:*:*
Версия от 0.9.13 (включая) до 1.0.3 (включая)
cpe:2.3:a:musl-libc:musl:*:*:*:*:*:*:*:*
Версия от 1.1.0 (включая) до 1.1.2 (исключая)

EPSS

Процентиль: 82%
0.01794
Низкий

9.8 Critical

CVSS3

7.5 High

CVSS2

Дефекты

CWE-787

Связанные уязвимости

CVSS3: 9.8
ubuntu
почти 6 лет назад

Multiple stack-based buffer overflows in the __dn_expand function in network/dn_expand.c in musl libc 1.1x before 1.1.2 and 0.9.13 through 1.0.3 allow remote attackers to (1) have unspecified impact via an invalid name length in a DNS response or (2) cause a denial of service (crash) via an invalid name length in a DNS response, related to an infinite loop with no output.

CVSS3: 9.8
debian
почти 6 лет назад

Multiple stack-based buffer overflows in the __dn_expand function in n ...

github
больше 3 лет назад

Multiple stack-based buffer overflows in the __dn_expand function in network/dn_expand.c in musl libc 1.1x before 1.1.2 and 0.9.13 through 1.0.3 allow remote attackers to (1) have unspecified impact via an invalid name length in a DNS response or (2) cause a denial of service (crash) via an invalid name length in a DNS response, related to an infinite loop with no output.

EPSS

Процентиль: 82%
0.01794
Низкий

9.8 Critical

CVSS3

7.5 High

CVSS2

Дефекты

CWE-787