Описание
Heap-based buffer overflow in the ares_create_query function in c-ares 1.x before 1.12.0 allows remote attackers to cause a denial of service (out-of-bounds write) or possibly execute arbitrary code via a hostname with an escaped trailing dot.
Релиз | Статус | Примечание |
---|---|---|
devel | not-affected | 1.12.0-1 |
esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was released [1.10.0-2ubuntu0.1]] |
esm-infra/xenial | not-affected | 1.10.0-3ubuntu0.1 |
precise | not-affected | |
precise/esm | DNE | precise was not-affected |
trusty | released | 1.10.0-2ubuntu0.1 |
trusty/esm | DNE | trusty was released [1.10.0-2ubuntu0.1] |
upstream | released | 1.12.0 |
vivid/stable-phone-overlay | ignored | end of life |
vivid/ubuntu-core | DNE |
Показывать по
7.5 High
CVSS2
9.8 Critical
CVSS3
Связанные уязвимости
Heap-based buffer overflow in the ares_create_query function in c-ares 1.x before 1.12.0 allows remote attackers to cause a denial of service (out-of-bounds write) or possibly execute arbitrary code via a hostname with an escaped trailing dot.
Heap-based buffer overflow in the ares_create_query function in c-ares 1.x before 1.12.0 allows remote attackers to cause a denial of service (out-of-bounds write) or possibly execute arbitrary code via a hostname with an escaped trailing dot.
Heap-based buffer overflow in the ares_create_query function in c-ares ...
7.5 High
CVSS2
9.8 Critical
CVSS3