Логотип exploitDog
bind:CVE-2014-3484
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2014-3484

Количество 4

Количество 4

ubuntu логотип

CVE-2014-3484

почти 6 лет назад

Multiple stack-based buffer overflows in the __dn_expand function in network/dn_expand.c in musl libc 1.1x before 1.1.2 and 0.9.13 through 1.0.3 allow remote attackers to (1) have unspecified impact via an invalid name length in a DNS response or (2) cause a denial of service (crash) via an invalid name length in a DNS response, related to an infinite loop with no output.

CVSS3: 9.8
EPSS: Низкий
nvd логотип

CVE-2014-3484

почти 6 лет назад

Multiple stack-based buffer overflows in the __dn_expand function in network/dn_expand.c in musl libc 1.1x before 1.1.2 and 0.9.13 through 1.0.3 allow remote attackers to (1) have unspecified impact via an invalid name length in a DNS response or (2) cause a denial of service (crash) via an invalid name length in a DNS response, related to an infinite loop with no output.

CVSS3: 9.8
EPSS: Низкий
debian логотип

CVE-2014-3484

почти 6 лет назад

Multiple stack-based buffer overflows in the __dn_expand function in n ...

CVSS3: 9.8
EPSS: Низкий
github логотип

GHSA-j83j-g9hw-7wvp

больше 3 лет назад

Multiple stack-based buffer overflows in the __dn_expand function in network/dn_expand.c in musl libc 1.1x before 1.1.2 and 0.9.13 through 1.0.3 allow remote attackers to (1) have unspecified impact via an invalid name length in a DNS response or (2) cause a denial of service (crash) via an invalid name length in a DNS response, related to an infinite loop with no output.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2014-3484

Multiple stack-based buffer overflows in the __dn_expand function in network/dn_expand.c in musl libc 1.1x before 1.1.2 and 0.9.13 through 1.0.3 allow remote attackers to (1) have unspecified impact via an invalid name length in a DNS response or (2) cause a denial of service (crash) via an invalid name length in a DNS response, related to an infinite loop with no output.

CVSS3: 9.8
2%
Низкий
почти 6 лет назад
nvd логотип
CVE-2014-3484

Multiple stack-based buffer overflows in the __dn_expand function in network/dn_expand.c in musl libc 1.1x before 1.1.2 and 0.9.13 through 1.0.3 allow remote attackers to (1) have unspecified impact via an invalid name length in a DNS response or (2) cause a denial of service (crash) via an invalid name length in a DNS response, related to an infinite loop with no output.

CVSS3: 9.8
2%
Низкий
почти 6 лет назад
debian логотип
CVE-2014-3484

Multiple stack-based buffer overflows in the __dn_expand function in n ...

CVSS3: 9.8
2%
Низкий
почти 6 лет назад
github логотип
GHSA-j83j-g9hw-7wvp

Multiple stack-based buffer overflows in the __dn_expand function in network/dn_expand.c in musl libc 1.1x before 1.1.2 and 0.9.13 through 1.0.3 allow remote attackers to (1) have unspecified impact via an invalid name length in a DNS response or (2) cause a denial of service (crash) via an invalid name length in a DNS response, related to an infinite loop with no output.

2%
Низкий
больше 3 лет назад

Уязвимостей на страницу