Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2011-0520

Опубликовано: 28 янв. 2011
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 7.5

Описание

The compress_add_dlabel_points function in dns/Compress.c in MaraDNS 1.4.03, 1.4.05, and probably other versions allows remote attackers to cause a denial of service (segmentation fault) and possibly execute arbitrary code via a long DNS hostname with a large number of labels, which triggers a heap-based buffer overflow.

РелизСтатусПримечание
artful

ignored

end of life
bionic

not-affected

1.4.03-1.1
dapper

ignored

end of life
devel

not-affected

1.4.03-1.1
esm-apps/bionic

not-affected

1.4.03-1.1
esm-apps/xenial

not-affected

1.4.03-1.1
esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was not-affected [1.4.03-1.1]]
hardy

ignored

end of life
karmic

ignored

end of life
lucid

ignored

end of life

Показывать по

Ссылки на источники

EPSS

Процентиль: 91%
0.06838
Низкий

7.5 High

CVSS2

Связанные уязвимости

nvd
почти 15 лет назад

The compress_add_dlabel_points function in dns/Compress.c in MaraDNS 1.4.03, 1.4.05, and probably other versions allows remote attackers to cause a denial of service (segmentation fault) and possibly execute arbitrary code via a long DNS hostname with a large number of labels, which triggers a heap-based buffer overflow.

debian
почти 15 лет назад

The compress_add_dlabel_points function in dns/Compress.c in MaraDNS 1 ...

github
больше 3 лет назад

The compress_add_dlabel_points function in dns/Compress.c in MaraDNS 1.4.03, 1.4.05, and probably other versions allows remote attackers to cause a denial of service (segmentation fault) and possibly execute arbitrary code via a long DNS hostname with a large number of labels, which triggers a heap-based buffer overflow.

EPSS

Процентиль: 91%
0.06838
Низкий

7.5 High

CVSS2