Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2014-3484

Опубликовано: 20 фев. 2020
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 7.5
CVSS3: 9.8

Описание

Multiple stack-based buffer overflows in the __dn_expand function in network/dn_expand.c in musl libc 1.1x before 1.1.2 and 0.9.13 through 1.0.3 allow remote attackers to (1) have unspecified impact via an invalid name length in a DNS response or (2) cause a denial of service (crash) via an invalid name length in a DNS response, related to an infinite loop with no output.

РелизСтатусПримечание
artful

not-affected

1.1.4-1
bionic

not-affected

1.1.4-1
cosmic

not-affected

1.1.4-1
devel

not-affected

1.1.4-1
disco

not-affected

1.1.4-1
esm-apps/bionic

not-affected

1.1.4-1
esm-apps/xenial

not-affected

1.1.4-1
esm-infra-legacy/trusty

released

0.9.15-1ubuntu0.1~esm1
lucid

DNE

precise

DNE

Показывать по

EPSS

Процентиль: 82%
0.01794
Низкий

7.5 High

CVSS2

9.8 Critical

CVSS3

Связанные уязвимости

CVSS3: 9.8
nvd
почти 6 лет назад

Multiple stack-based buffer overflows in the __dn_expand function in network/dn_expand.c in musl libc 1.1x before 1.1.2 and 0.9.13 through 1.0.3 allow remote attackers to (1) have unspecified impact via an invalid name length in a DNS response or (2) cause a denial of service (crash) via an invalid name length in a DNS response, related to an infinite loop with no output.

CVSS3: 9.8
debian
почти 6 лет назад

Multiple stack-based buffer overflows in the __dn_expand function in n ...

github
больше 3 лет назад

Multiple stack-based buffer overflows in the __dn_expand function in network/dn_expand.c in musl libc 1.1x before 1.1.2 and 0.9.13 through 1.0.3 allow remote attackers to (1) have unspecified impact via an invalid name length in a DNS response or (2) cause a denial of service (crash) via an invalid name length in a DNS response, related to an infinite loop with no output.

EPSS

Процентиль: 82%
0.01794
Низкий

7.5 High

CVSS2

9.8 Critical

CVSS3