Описание
The vulnerability is caused by improper check for check if RDLENGTH does not overflow the buffer in response from DNS server.
| Релиз | Статус | Примечание |
|---|---|---|
| bionic | ignored | end of standard support |
| devel | not-affected | 1:6.0.29+dfsg-1 |
| esm-apps/bionic | not-affected | code not present |
| esm-apps/focal | not-affected | code not present |
| esm-apps/jammy | needed | |
| esm-apps/xenial | not-affected | code not present |
| esm-infra-legacy/trusty | not-affected | code not present |
| focal | not-affected | code not present |
| jammy | needed | |
| lunar | ignored | end of life, was needs-triage |
Показывать по
10
EPSS
Процентиль: 34%
0.00134
Низкий
3.9 Low
CVSS3
Связанные уязвимости
CVSS3: 3.9
nvd
почти 2 года назад
The vulnerability is caused by improper check for check if RDLENGTH does not overflow the buffer in response from DNS server.
CVSS3: 3.9
debian
почти 2 года назад
The vulnerability is caused by improper check for check if RDLENGTH do ...
CVSS3: 8.1
github
почти 2 года назад
The vulnerability is caused by improper check for check if RDLENGTH does not overflow the buffer in response from DNS server.
CVSS3: 8.1
fstec
почти 2 года назад
Уязвимость компонента DNS Response Handler агента универсальной системы мониторинга Zabbix, позволяющая нарушителю вызвать переполнение буфера
EPSS
Процентиль: 34%
0.00134
Низкий
3.9 Low
CVSS3