[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250770

 
 

909

 
 

196157

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

CVE-2017-9430 -- dnstracer

ID: oval:org.secpod.oval:def:2000815Date: (C)2019-06-03   (M)2021-06-02
Class: VULNERABILITYFamily: unix




Stack-based buffer overflow in dnstracer through 1.9 allows attackers to cause a denial of service or possibly have unspecified other impact via a command line with a long name argument that is mishandled in a strcpy call for argv[0]. An example threat model is a web application that launches dnstracer with an untrusted name string.

Platform:
Debian 8.x
Debian 9.x
Product:
dnstracer
Reference:
CVE-2017-9430
CVE    1
CVE-2017-9430
CPE    3
cpe:/o:debian:debian_linux:8.x
cpe:/o:debian:debian_linux:9.x
cpe:/a:mavetju:dnstracer

© SecPod Technologies