CVE-2008-2469

Heap-based buffer overflow in the SPF_dns_resolv_lookup function in Spf_dns_resolv.c in libspf2 before 1.2.8 allows remote attackers to execute arbitrary code via a long DNS TXT record with a modified length field.
References
Link Resource
http://bugs.gentoo.org/show_bug.cgi?format=multiple&id=242254
http://secunia.com/advisories/32396
http://secunia.com/advisories/32450
http://secunia.com/advisories/32496 Vendor Advisory
http://secunia.com/advisories/32720
http://security.gentoo.org/glsa/glsa-200810-03.xml
http://securityreason.com/securityalert/4487
http://up2date.astaro.com/2008/11/up2date_7305_released.html
http://www.debian.org/security/2008/dsa-1659
http://www.doxpara.com/?p=1263
http://www.doxpara.com/?page_id=1256
http://www.kb.cert.org/vuls/id/183657 US Government Resource
http://www.securityfocus.com/bid/31881 Exploit Patch
http://www.vupen.com/english/advisories/2008/2896
https://answers.launchpad.net/ubuntu/gutsy/+source/libspf2/1.2.5.dfsg-4ubuntu0.7.10.1
https://bugs.launchpad.net/ubuntu/feisty/+source/libspf2/+bug/271025
https://exchange.xforce.ibmcloud.com/vulnerabilities/46055
https://www.exploit-db.com/exploits/6805
http://bugs.gentoo.org/show_bug.cgi?format=multiple&id=242254
http://secunia.com/advisories/32396
http://secunia.com/advisories/32450
http://secunia.com/advisories/32496 Vendor Advisory
http://secunia.com/advisories/32720
http://security.gentoo.org/glsa/glsa-200810-03.xml
http://securityreason.com/securityalert/4487
http://up2date.astaro.com/2008/11/up2date_7305_released.html
http://www.debian.org/security/2008/dsa-1659
http://www.doxpara.com/?p=1263
http://www.doxpara.com/?page_id=1256
http://www.kb.cert.org/vuls/id/183657 US Government Resource
http://www.securityfocus.com/bid/31881 Exploit Patch
http://www.vupen.com/english/advisories/2008/2896
https://answers.launchpad.net/ubuntu/gutsy/+source/libspf2/1.2.5.dfsg-4ubuntu0.7.10.1
https://bugs.launchpad.net/ubuntu/feisty/+source/libspf2/+bug/271025
https://exchange.xforce.ibmcloud.com/vulnerabilities/46055
https://www.exploit-db.com/exploits/6805
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:libspf:libspf2:*:*:*:*:*:*:*:*
cpe:2.3:a:libspf:libspf2:1.0.2:*:*:*:*:*:*:*
cpe:2.3:a:libspf:libspf2:1.0.3:*:*:*:*:*:*:*
cpe:2.3:a:libspf:libspf2:1.0.4:*:*:*:*:*:*:*
cpe:2.3:a:libspf:libspf2:1.2.1:*:*:*:*:*:*:*
cpe:2.3:a:libspf:libspf2:1.2.3:*:*:*:*:*:*:*
cpe:2.3:a:libspf:libspf2:1.2.4:*:*:*:*:*:*:*
cpe:2.3:a:libspf:libspf2:1.2.5:*:*:*:*:*:*:*
cpe:2.3:a:libspf:libspf2:1.2.6:*:*:*:*:*:*:*

History

21 Nov 2024, 00:46

Type Values Removed Values Added
References () http://bugs.gentoo.org/show_bug.cgi?format=multiple&id=242254 - () http://bugs.gentoo.org/show_bug.cgi?format=multiple&id=242254 -
References () http://secunia.com/advisories/32396 - () http://secunia.com/advisories/32396 -
References () http://secunia.com/advisories/32450 - () http://secunia.com/advisories/32450 -
References () http://secunia.com/advisories/32496 - Vendor Advisory () http://secunia.com/advisories/32496 - Vendor Advisory
References () http://secunia.com/advisories/32720 - () http://secunia.com/advisories/32720 -
References () http://security.gentoo.org/glsa/glsa-200810-03.xml - () http://security.gentoo.org/glsa/glsa-200810-03.xml -
References () http://securityreason.com/securityalert/4487 - () http://securityreason.com/securityalert/4487 -
References () http://up2date.astaro.com/2008/11/up2date_7305_released.html - () http://up2date.astaro.com/2008/11/up2date_7305_released.html -
References () http://www.debian.org/security/2008/dsa-1659 - () http://www.debian.org/security/2008/dsa-1659 -
References () http://www.doxpara.com/?p=1263 - () http://www.doxpara.com/?p=1263 -
References () http://www.doxpara.com/?page_id=1256 - () http://www.doxpara.com/?page_id=1256 -
References () http://www.kb.cert.org/vuls/id/183657 - US Government Resource () http://www.kb.cert.org/vuls/id/183657 - US Government Resource
References () http://www.securityfocus.com/bid/31881 - Exploit, Patch () http://www.securityfocus.com/bid/31881 - Exploit, Patch
References () http://www.vupen.com/english/advisories/2008/2896 - () http://www.vupen.com/english/advisories/2008/2896 -
References () https://answers.launchpad.net/ubuntu/gutsy/+source/libspf2/1.2.5.dfsg-4ubuntu0.7.10.1 - () https://answers.launchpad.net/ubuntu/gutsy/+source/libspf2/1.2.5.dfsg-4ubuntu0.7.10.1 -
References () https://bugs.launchpad.net/ubuntu/feisty/+source/libspf2/+bug/271025 - () https://bugs.launchpad.net/ubuntu/feisty/+source/libspf2/+bug/271025 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/46055 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/46055 -
References () https://www.exploit-db.com/exploits/6805 - () https://www.exploit-db.com/exploits/6805 -

Information

Published : 2008-10-23 22:00

Updated : 2024-11-21 00:46


NVD link : CVE-2008-2469

Mitre link : CVE-2008-2469

CVE.ORG link : CVE-2008-2469


JSON object : View

Products Affected

libspf

  • libspf2
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer