Описание
musl libc before 1.1.17 has a buffer overflow via crafted DNS replies because dns_parse_callback in network/lookup_name.c does not restrict the number of addresses, and thus an attacker can provide an unexpected number by sending A records in a reply to an AAAA query.
| Релиз | Статус | Примечание |
|---|---|---|
| artful | ignored | end of life |
| bionic | not-affected | 1.1.19-1 |
| cosmic | not-affected | 1.1.19-1 |
| devel | not-affected | 1.1.19-1 |
| disco | not-affected | 1.1.19-1 |
| eoan | not-affected | 1.1.19-1 |
| esm-apps/bionic | not-affected | 1.1.19-1 |
| esm-apps/focal | not-affected | 1.1.19-1 |
| esm-apps/jammy | not-affected | 1.1.19-1 |
| esm-apps/xenial | released | 1.1.9-1ubuntu0.1~esm2 |
Показывать по
Ссылки на источники
EPSS
5 Medium
CVSS2
7.5 High
CVSS3
Связанные уязвимости
musl libc before 1.1.17 has a buffer overflow via crafted DNS replies because dns_parse_callback in network/lookup_name.c does not restrict the number of addresses, and thus an attacker can provide an unexpected number by sending A records in a reply to an AAAA query.
musl libc before 1.1.17 has a buffer overflow via crafted DNS replies ...
musl libc before 1.1.17 has a buffer overflow via crafted DNS replies because dns_parse_callback in network/lookup_name.c does not restrict the number of addresses, and thus an attacker can provide an unexpected number by sending A records in a reply to an AAAA query.
Уязвимость функции dns_parse_callback в network/lookup_name.c библиотеки для языка Си для операционных систем на основе ядра операционных систем Linux Musl, позволяющая нарушителю вызвать отказ в обслуживании
EPSS
5 Medium
CVSS2
7.5 High
CVSS3