Stack-based buffer overflow in the inet_pton function in network/inet_pton.c in musl libc 0.9.15 through 1.0.4, and 1.1.0 through 1.1.7 allows attackers to have unspecified impact via unknown vectors.
References
Link | Resource |
---|---|
http://www.openwall.com/lists/oss-security/2015/03/30/3 | Mailing List Patch VDB Entry |
http://www.securityfocus.com/bid/73408 | Third Party Advisory VDB Entry |
http://www.openwall.com/lists/oss-security/2015/03/30/3 | Mailing List Patch VDB Entry |
http://www.securityfocus.com/bid/73408 | Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 02:26
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.openwall.com/lists/oss-security/2015/03/30/3 - Mailing List, Patch, VDB Entry | |
References | () http://www.securityfocus.com/bid/73408 - Third Party Advisory, VDB Entry |
Information
Published : 2017-08-18 16:29
Updated : 2024-11-21 02:26
NVD link : CVE-2015-1817
Mitre link : CVE-2015-1817
CVE.ORG link : CVE-2015-1817
JSON object : View
Products Affected
musl-libc
- musl
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer