Heap-based buffer overflow in dns.cpp in InspIRCd 2.0.5 might allow remote attackers to execute arbitrary code via a crafted DNS query that uses compression.
References
Configurations
History
21 Nov 2024, 01:37
Type | Values Removed | Values Added |
---|---|---|
References | () http://osvdb.org/80263 - | |
References | () http://secunia.com/advisories/48474 - | |
References | () http://www.debian.org/security/2012/dsa-2448 - | |
References | () http://www.kb.cert.org/vuls/id/212651 - Patch, US Government Resource | |
References | () http://www.securityfocus.com/bid/52561 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/74157 - | |
References | () https://github.com/inspircd/inspircd/commit/fe7dbd2c104c37f6f3af7d9f1646a3c332aea4a4 - Exploit, Patch |
Information
Published : 2012-03-22 03:28
Updated : 2024-11-21 01:37
NVD link : CVE-2012-1836
Mitre link : CVE-2012-1836
CVE.ORG link : CVE-2012-1836
JSON object : View
Products Affected
inspircd
- inspircd
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer