Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2017-15650

Опубликовано: 19 окт. 2017
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 5
CVSS3: 7.5

Описание

musl libc before 1.1.17 has a buffer overflow via crafted DNS replies because dns_parse_callback in network/lookup_name.c does not restrict the number of addresses, and thus an attacker can provide an unexpected number by sending A records in a reply to an AAAA query.

РелизСтатусПримечание
artful

ignored

end of life
bionic

not-affected

1.1.19-1
cosmic

not-affected

1.1.19-1
devel

not-affected

1.1.19-1
disco

not-affected

1.1.19-1
eoan

not-affected

1.1.19-1
esm-apps/bionic

not-affected

1.1.19-1
esm-apps/focal

not-affected

1.1.19-1
esm-apps/jammy

not-affected

1.1.19-1
esm-apps/xenial

released

1.1.9-1ubuntu0.1~esm2

Показывать по

EPSS

Процентиль: 70%
0.0063
Низкий

5 Medium

CVSS2

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
nvd
больше 8 лет назад

musl libc before 1.1.17 has a buffer overflow via crafted DNS replies because dns_parse_callback in network/lookup_name.c does not restrict the number of addresses, and thus an attacker can provide an unexpected number by sending A records in a reply to an AAAA query.

CVSS3: 7.5
debian
больше 8 лет назад

musl libc before 1.1.17 has a buffer overflow via crafted DNS replies ...

CVSS3: 7.5
github
больше 3 лет назад

musl libc before 1.1.17 has a buffer overflow via crafted DNS replies because dns_parse_callback in network/lookup_name.c does not restrict the number of addresses, and thus an attacker can provide an unexpected number by sending A records in a reply to an AAAA query.

CVSS3: 7.5
fstec
больше 8 лет назад

Уязвимость функции dns_parse_callback в network/lookup_name.c библиотеки для языка Си для операционных систем на основе ядра операционных систем Linux Musl, позволяющая нарушителю вызвать отказ в обслуживании

EPSS

Процентиль: 70%
0.0063
Низкий

5 Medium

CVSS2

7.5 High

CVSS3