Описание
The vulnerability is caused by improper check for check if RDLENGTH does not overflow the buffer in response from DNS server.
Релиз | Статус | Примечание |
---|---|---|
bionic | ignored | end of standard support |
devel | not-affected | 1:6.0.29+dfsg-1 |
esm-apps/bionic | not-affected | code not present |
esm-apps/focal | not-affected | code not present |
esm-apps/jammy | needed | |
esm-apps/xenial | not-affected | code not present |
esm-infra-legacy/trusty | not-affected | code not present |
focal | not-affected | code not present |
jammy | needed | |
lunar | ignored | end of life, was needs-triage |
Показывать по
10
EPSS
Процентиль: 32%
0.00122
Низкий
3.9 Low
CVSS3
Связанные уязвимости
CVSS3: 3.9
nvd
больше 1 года назад
The vulnerability is caused by improper check for check if RDLENGTH does not overflow the buffer in response from DNS server.
CVSS3: 3.9
debian
больше 1 года назад
The vulnerability is caused by improper check for check if RDLENGTH do ...
CVSS3: 8.1
github
больше 1 года назад
The vulnerability is caused by improper check for check if RDLENGTH does not overflow the buffer in response from DNS server.
CVSS3: 8.1
fstec
больше 1 года назад
Уязвимость компонента DNS Response Handler агента универсальной системы мониторинга Zabbix, позволяющая нарушителю вызвать переполнение буфера
EPSS
Процентиль: 32%
0.00122
Низкий
3.9 Low
CVSS3