emdns_resolve_raw in emdns.c in emdns through fbd1eef calls strlen with an input that may not be '\0' terminated, leading to a stack-based buffer over-read. This can be triggered by a remote adversary that can send DNS requests to the emdns server. The impact could vary depending on the system libraries, compiler, and processor architecture. Code before be565c3 is unaffected.
References
Configurations
No configuration.
History
21 Nov 2024, 08:36
Type | Values Removed | Values Added |
---|---|---|
References | () https://papers.mathyvanhoef.com/esorics2024.pdf - |
01 Aug 2024, 13:45
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-121 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
Summary |
|
29 Apr 2024, 22:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-04-29 22:15
Updated : 2024-11-21 08:36
NVD link : CVE-2023-50434
Mitre link : CVE-2023-50434
CVE.ORG link : CVE-2023-50434
JSON object : View
Products Affected
No product.
CWE
CWE-121
Stack-based Buffer Overflow