Stack-based buffer overflow in dnstracer through 1.9 allows attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a command line with a long name argument that is mishandled in a strcpy call for argv[0]. An example threat model is a web application that launches dnstracer with an untrusted name string.
References
Link | Resource |
---|---|
https://cxsecurity.com/issue/WLB-2017060030 | Third Party Advisory |
https://packetstormsecurity.com/files/142799/DNSTracer-1.8.1-Buffer-Overflow.html | Third Party Advisory |
https://www.exploit-db.com/exploits/42115/ | Third Party Advisory |
https://www.exploit-db.com/exploits/42424/ |
Configurations
History
No history.
Information
Published : 2017-06-05 11:29
Updated : 2024-02-28 16:04
NVD link : CVE-2017-9430
Mitre link : CVE-2017-9430
CVE.ORG link : CVE-2017-9430
JSON object : View
Products Affected
dnstracer_project
- dnstracer
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer