Buffer overflow in the ares_parse_a_reply function in the embedded ares library in ReSIProcate before 1.12.0 allows remote attackers to cause a denial of service (out-of-bounds-read) via a crafted DNS response.
References
Link | Resource |
---|---|
https://github.com/resiprocate/resiprocate/commit/d67a9ca6fd06ca65d23e313bdbad1ef4dd3aa0df | Patch Third Party Advisory |
https://list.resiprocate.org/archive/resiprocate-users/msg02700.html | Vendor Advisory |
https://github.com/resiprocate/resiprocate/commit/d67a9ca6fd06ca65d23e313bdbad1ef4dd3aa0df | Patch Third Party Advisory |
https://list.resiprocate.org/archive/resiprocate-users/msg02700.html | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 03:36
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/resiprocate/resiprocate/commit/d67a9ca6fd06ca65d23e313bdbad1ef4dd3aa0df - Patch, Third Party Advisory | |
References | () https://list.resiprocate.org/archive/resiprocate-users/msg02700.html - Vendor Advisory |
Information
Published : 2017-08-18 14:29
Updated : 2024-11-21 03:36
NVD link : CVE-2017-9454
Mitre link : CVE-2017-9454
CVE.ORG link : CVE-2017-9454
JSON object : View
Products Affected
resiprocate
- resiprocate
CWE
CWE-125
Out-of-bounds Read