[Forgot Password]
Login  Register Subscribe

24003

 
 

131573

 
 

108530

 
 

909

 
 

85343

 
 

134

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML view JSON

CVE-2008-2469Date: (C)2008-10-23   (M)2018-02-19


Heap-based buffer overflow in the SPF_dns_resolv_lookup function in Spf_dns_resolv.c in libspf2 before 1.2.8 allows remote attackers to execute arbitrary code via a long DNS TXT record with a modified length field.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V3 Severity:CVSS V2 Severity:
CVSS Score : CVSS Score : 10.0
Exploit Score: Exploit Score: 10.0
Impact Score: Impact Score: 10.0
 
CVSS V3 Metrics:CVSS V2 Metrics:
Attack Vector: Access Vector: NETWORK
Attack Complexity: Access Complexity: LOW
Privileges Required: Authentication: NONE
User Interaction: Confidentiality: COMPLETE
Scope: Integrity: COMPLETE
Confidentiality: Availability: COMPLETE
Integrity:  
Availability:  
  
Reference:
BID-31881
SECUNIA-32396
SECUNIA-32450
SECUNIA-32496
SECUNIA-32720
SREASON-4487
EXPLOIT-DB-6805
ADV-2008-2896
DSA-1659
GLSA-200810-03
VU#183657
http://bugs.gentoo.org/show_bug.cgi?format=multiple&id=242254
http://up2date.astaro.com/2008/11/up2date_7305_released.html
http://www.doxpara.com/?p=1263
http://www.doxpara.com/?page_id=1256
https://answers.launchpad.net/ubuntu/gutsy/+source/libspf2/1.2.5.dfsg-4ubuntu0.7.10.1
https://bugs.launchpad.net/ubuntu/feisty/+source/libspf2/+bug/271025
libspf2-dnstxtrecord-bo(46055)

CWE    1
CWE-119
OVAL    1
oval:org.mitre.oval:def:7802

© SecPod Technologies