Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2008-2357

Опубликовано: 21 мая 2008
Источник: ubuntu
Приоритет: low
CVSS2: 6.8

Описание

Stack-based buffer overflow in the split_redraw function in split.c in mtr before 0.73, when invoked with the -p (aka --split) option, allows remote attackers to execute arbitrary code via a crafted DNS PTR record. NOTE: it could be argued that this is a vulnerability in the ns_name_ntop function in resolv/ns_name.c in glibc and the proper fix should be in glibc; if so, then this should not be treated as a vulnerability in mtr.

РелизСтатусПримечание
dapper

ignored

end of life
devel

not-affected

feisty

ignored

end of life, was needed
gutsy

ignored

end of life, was needed
hardy

not-affected

intrepid

not-affected

jaunty

not-affected

karmic

not-affected

lucid

not-affected

maverick

not-affected

Показывать по

Ссылки на источники

6.8 Medium

CVSS2

Связанные уязвимости

redhat
больше 17 лет назад

Stack-based buffer overflow in the split_redraw function in split.c in mtr before 0.73, when invoked with the -p (aka --split) option, allows remote attackers to execute arbitrary code via a crafted DNS PTR record. NOTE: it could be argued that this is a vulnerability in the ns_name_ntop function in resolv/ns_name.c in glibc and the proper fix should be in glibc; if so, then this should not be treated as a vulnerability in mtr.

nvd
больше 17 лет назад

Stack-based buffer overflow in the split_redraw function in split.c in mtr before 0.73, when invoked with the -p (aka --split) option, allows remote attackers to execute arbitrary code via a crafted DNS PTR record. NOTE: it could be argued that this is a vulnerability in the ns_name_ntop function in resolv/ns_name.c in glibc and the proper fix should be in glibc; if so, then this should not be treated as a vulnerability in mtr.

debian
больше 17 лет назад

Stack-based buffer overflow in the split_redraw function in split.c in ...

github
больше 3 лет назад

Stack-based buffer overflow in the split_redraw function in split.c in mtr before 0.73, when invoked with the -p (aka --split) option, allows remote attackers to execute arbitrary code via a crafted DNS PTR record. NOTE: it could be argued that this is a vulnerability in the ns_name_ntop function in resolv/ns_name.c in glibc and the proper fix should be in glibc; if so, then this should not be treated as a vulnerability in mtr.

6.8 Medium

CVSS2