Описание
Buffer overflow in the ares_parse_a_reply function in the embedded ares library in ReSIProcate before 1.12.0 allows remote attackers to cause a denial of service (out-of-bounds-read) via a crafted DNS response.
| Релиз | Статус | Примечание |
|---|---|---|
| devel | not-affected | uses system c-ares |
| esm-apps/xenial | not-affected | uses system c-ares |
| esm-infra-legacy/trusty | not-affected | uses system c-ares |
| precise/esm | DNE | |
| trusty | not-affected | uses system c-ares |
| trusty/esm | not-affected | uses system c-ares |
| upstream | needs-triage | |
| vivid/ubuntu-core | DNE | |
| xenial | not-affected | uses system c-ares |
| zesty | not-affected | uses system c-ares |
Показывать по
5 Medium
CVSS2
7.5 High
CVSS3
Связанные уязвимости
Buffer overflow in the ares_parse_a_reply function in the embedded ares library in ReSIProcate before 1.12.0 allows remote attackers to cause a denial of service (out-of-bounds-read) via a crafted DNS response.
Buffer overflow in the ares_parse_a_reply function in the embedded are ...
Buffer overflow in the ares_parse_a_reply function in the embedded ares library in ReSIProcate before 1.12.0 allows remote attackers to cause a denial of service (out-of-bounds-read) via a crafted DNS response.
5 Medium
CVSS2
7.5 High
CVSS3