dns2tcp before 0.4.1 does not properly handle negative values in a certain length field in the input argument to the (1) dns_simple_decode or (2) dns_decode function, which allows remote attackers to overwrite a buffer and have unspecified other impact.
References
Configurations
History
21 Nov 2024, 00:50
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.hsc.fr/ressources/outils/dns2tcp/index.html.en - | |
References | () http://www.openwall.com/lists/oss-security/2008/09/03/5 - Exploit | |
References | () http://www.securityfocus.com/bid/31080 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/44974 - |
Information
Published : 2008-09-04 17:41
Updated : 2025-04-09 00:30
NVD link : CVE-2008-3910
Mitre link : CVE-2008-3910
CVE.ORG link : CVE-2008-3910
JSON object : View
Products Affected
hsc
- dns2tcp
CWE
CWE-189
Numeric Errors