[Forgot Password]
Login  Register Subscribe

23631

 
 

115038

 
 

96125

 
 

909

 
 

78020

 
 

109

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML

CVE-2008-2469

Date: (C)2008-10-23   (M)2017-10-04
 
CVSS Score: 10.0Access Vector: NETWORK
Exploitability Subscore: 10.0Access Complexity: LOW
Impact Subscore: 10.0Authentication: NONE
 Confidentiality: COMPLETE
 Integrity: COMPLETE
 Availability: COMPLETE











Heap-based buffer overflow in the SPF_dns_resolv_lookup function in Spf_dns_resolv.c in libspf2 before 1.2.8 allows remote attackers to execute arbitrary code via a long DNS TXT record with a modified length field.

Reference:
BID-31881
SECUNIA-32396
SECUNIA-32450
SECUNIA-32496
SECUNIA-32720
SREASON-4487
EXPLOIT-DB-6805
ADV-2008-2896
DSA-1659
GLSA-200810-03
VU#183657
http://bugs.gentoo.org/show_bug.cgi?format=multiple&id=242254
http://up2date.astaro.com/2008/11/up2date_7305_released.html
http://www.doxpara.com/?p=1263
http://www.doxpara.com/?page_id=1256
https://answers.launchpad.net/ubuntu/gutsy/+source/libspf2/1.2.5.dfsg-4ubuntu0.7.10.1
https://bugs.launchpad.net/ubuntu/feisty/+source/libspf2/+bug/271025
libspf2-dnstxtrecord-bo(46055)

CWE    1
CWE-119
OVAL    1
oval:org.mitre.oval:def:7802

© 2013 SecPod Technologies