[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248149

 
 

909

 
 

194803

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2008-2469Date: (C)2008-10-23   (M)2023-12-22


Heap-based buffer overflow in the SPF_dns_resolv_lookup function in Spf_dns_resolv.c in libspf2 before 1.2.8 allows remote attackers to execute arbitrary code via a long DNS TXT record with a modified length field.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 10.0
Exploit Score: 10.0
Impact Score: 10.0
 
CVSS V2 Metrics:
Access Vector: NETWORK
Access Complexity: LOW
Authentication: NONE
Confidentiality: COMPLETE
Integrity: COMPLETE
Availability: COMPLETE
  
Reference:
BID-31881
SECUNIA-32396
SECUNIA-32450
SECUNIA-32496
SECUNIA-32720
SREASON-4487
EXPLOIT-DB-6805
ADV-2008-2896
DSA-1659
GLSA-200810-03
VU#183657
http://bugs.gentoo.org/show_bug.cgi?format=multiple&id=242254
http://up2date.astaro.com/2008/11/up2date_7305_released.html
http://www.doxpara.com/?p=1263
http://www.doxpara.com/?page_id=1256
https://answers.launchpad.net/ubuntu/gutsy/+source/libspf2/1.2.5.dfsg-4ubuntu0.7.10.1
https://bugs.launchpad.net/ubuntu/feisty/+source/libspf2/+bug/271025
libspf2-dnstxtrecord-bo(46055)

CWE    1
CWE-119
OVAL    1
oval:org.mitre.oval:def:7802

© SecPod Technologies