CVE-2011-3581

Heap-based buffer overflow in the ldns_rr_new_frm_str_internal function in ldns before 1.6.11 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a Resource Record (RR) with an unknown type containing input that is longer than a specified length.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:nlnetlabs:ldns:*:*:*:*:*:*:*:*
cpe:2.3:a:nlnetlabs:ldns:0.50:*:*:*:*:*:*:*
cpe:2.3:a:nlnetlabs:ldns:0.60:*:*:*:*:*:*:*
cpe:2.3:a:nlnetlabs:ldns:0.65:*:*:*:*:*:*:*
cpe:2.3:a:nlnetlabs:ldns:0.66:*:*:*:*:*:*:*
cpe:2.3:a:nlnetlabs:ldns:0.70:*:*:*:*:*:*:*
cpe:2.3:a:nlnetlabs:ldns:1.0.0:*:*:*:*:*:*:*
cpe:2.3:a:nlnetlabs:ldns:1.1.0:*:*:*:*:*:*:*
cpe:2.3:a:nlnetlabs:ldns:1.2.0:*:*:*:*:*:*:*
cpe:2.3:a:nlnetlabs:ldns:1.2.1:*:*:*:*:*:*:*
cpe:2.3:a:nlnetlabs:ldns:1.2.2:*:*:*:*:*:*:*
cpe:2.3:a:nlnetlabs:ldns:1.3:*:*:*:*:*:*:*
cpe:2.3:a:nlnetlabs:ldns:1.4.0:*:*:*:*:*:*:*
cpe:2.3:a:nlnetlabs:ldns:1.4.1:*:*:*:*:*:*:*
cpe:2.3:a:nlnetlabs:ldns:1.5.0:*:*:*:*:*:*:*
cpe:2.3:a:nlnetlabs:ldns:1.5.1:*:*:*:*:*:*:*
cpe:2.3:a:nlnetlabs:ldns:1.6.0:*:*:*:*:*:*:*
cpe:2.3:a:nlnetlabs:ldns:1.6.1:*:*:*:*:*:*:*
cpe:2.3:a:nlnetlabs:ldns:1.6.2:*:*:*:*:*:*:*
cpe:2.3:a:nlnetlabs:ldns:1.6.3:*:*:*:*:*:*:*
cpe:2.3:a:nlnetlabs:ldns:1.6.4:*:*:*:*:*:*:*
cpe:2.3:a:nlnetlabs:ldns:1.6.5:*:*:*:*:*:*:*
cpe:2.3:a:nlnetlabs:ldns:1.6.6:*:*:*:*:*:*:*
cpe:2.3:a:nlnetlabs:ldns:1.6.7:*:*:*:*:*:*:*
cpe:2.3:a:nlnetlabs:ldns:1.6.8:*:*:*:*:*:*:*
cpe:2.3:a:nlnetlabs:ldns:1.6.9:*:*:*:*:*:*:*

History

21 Nov 2024, 01:30

Type Values Removed Values Added
References () http://lists.fedoraproject.org/pipermail/package-announce/2011-October/068091.html - () http://lists.fedoraproject.org/pipermail/package-announce/2011-October/068091.html -
References () http://lists.fedoraproject.org/pipermail/package-announce/2011-October/068201.html - () http://lists.fedoraproject.org/pipermail/package-announce/2011-October/068201.html -
References () http://lists.fedoraproject.org/pipermail/package-announce/2011-October/068239.html - () http://lists.fedoraproject.org/pipermail/package-announce/2011-October/068239.html -
References () http://lists.opensuse.org/opensuse-security-announce/2011-10/msg00008.html - () http://lists.opensuse.org/opensuse-security-announce/2011-10/msg00008.html -
References () http://nlnetlabs.nl/svn/ldns/tags/release-1.6.11/Changelog - () http://nlnetlabs.nl/svn/ldns/tags/release-1.6.11/Changelog -
References () http://seclists.org/oss-sec/2011/q3/503 - () http://seclists.org/oss-sec/2011/q3/503 -
References () http://seclists.org/oss-sec/2011/q3/542 - () http://seclists.org/oss-sec/2011/q3/542 -
References () http://secunia.com/advisories/46470 - Vendor Advisory () http://secunia.com/advisories/46470 - Vendor Advisory
References () http://secunia.com/advisories/46476 - Vendor Advisory () http://secunia.com/advisories/46476 - Vendor Advisory
References () http://www.nlnetlabs.nl/bugs-script/show_bug.cgi?id=403 - () http://www.nlnetlabs.nl/bugs-script/show_bug.cgi?id=403 -
References () http://www.securityfocus.com/bid/49748 - () http://www.securityfocus.com/bid/49748 -

Information

Published : 2011-11-04 21:55

Updated : 2024-11-21 01:30


NVD link : CVE-2011-3581

Mitre link : CVE-2011-3581

CVE.ORG link : CVE-2011-3581


JSON object : View

Products Affected

nlnetlabs

  • ldns
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer