Количество 7
Количество 7
CVE-2016-7069
An issue has been found in dnsdist before 1.2.0 in the way EDNS0 OPT records are handled when parsing responses from a backend. When dnsdist is configured to add EDNS Client Subnet to a query, the response may contain an EDNS0 OPT record that has to be removed before forwarding the response to the initial client. On a 32-bit system, the pointer arithmetic used when parsing the received response to remove that record might trigger an undefined behavior leading to a crash.
CVE-2016-7069
An issue has been found in dnsdist before 1.2.0 in the way EDNS0 OPT records are handled when parsing responses from a backend. When dnsdist is configured to add EDNS Client Subnet to a query, the response may contain an EDNS0 OPT record that has to be removed before forwarding the response to the initial client. On a 32-bit system, the pointer arithmetic used when parsing the received response to remove that record might trigger an undefined behavior leading to a crash.
CVE-2016-7069
An issue has been found in dnsdist before 1.2.0 in the way EDNS0 OPT r ...
GHSA-v3pf-fvxp-8mjf
An issue has been found in dnsdist before 1.2.0 in the way EDNS0 OPT records are handled when parsing responses from a backend. When dnsdist is configured to add EDNS Client Subnet to a query, the response may contain an EDNS0 OPT record that has to be removed before forwarding the response to the initial client. On a 32-bit system, the pointer arithmetic used when parsing the received response to remove that record might trigger an undefined behavior leading to a crash.
SUSE-SU-2023:2777-1
Security update for dnsdist
SUSE-SU-2023:2760-2
Security update for dnsdist
SUSE-SU-2023:2760-1
Security update for dnsdist
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2016-7069 An issue has been found in dnsdist before 1.2.0 in the way EDNS0 OPT records are handled when parsing responses from a backend. When dnsdist is configured to add EDNS Client Subnet to a query, the response may contain an EDNS0 OPT record that has to be removed before forwarding the response to the initial client. On a 32-bit system, the pointer arithmetic used when parsing the received response to remove that record might trigger an undefined behavior leading to a crash. | CVSS3: 5.9 | 0% Низкий | больше 7 лет назад | |
CVE-2016-7069 An issue has been found in dnsdist before 1.2.0 in the way EDNS0 OPT records are handled when parsing responses from a backend. When dnsdist is configured to add EDNS Client Subnet to a query, the response may contain an EDNS0 OPT record that has to be removed before forwarding the response to the initial client. On a 32-bit system, the pointer arithmetic used when parsing the received response to remove that record might trigger an undefined behavior leading to a crash. | CVSS3: 5.9 | 0% Низкий | больше 7 лет назад | |
CVE-2016-7069 An issue has been found in dnsdist before 1.2.0 in the way EDNS0 OPT r ... | CVSS3: 5.9 | 0% Низкий | больше 7 лет назад | |
GHSA-v3pf-fvxp-8mjf An issue has been found in dnsdist before 1.2.0 in the way EDNS0 OPT records are handled when parsing responses from a backend. When dnsdist is configured to add EDNS Client Subnet to a query, the response may contain an EDNS0 OPT record that has to be removed before forwarding the response to the initial client. On a 32-bit system, the pointer arithmetic used when parsing the received response to remove that record might trigger an undefined behavior leading to a crash. | CVSS3: 7.5 | 0% Низкий | больше 3 лет назад | |
SUSE-SU-2023:2777-1 Security update for dnsdist | больше 2 лет назад | |||
SUSE-SU-2023:2760-2 Security update for dnsdist | около 2 лет назад | |||
SUSE-SU-2023:2760-1 Security update for dnsdist | около 2 лет назад |
Уязвимостей на страницу