2 results (0.006 seconds)

CVSS: 10.0EPSS: 91%CPEs: 9EXPL: 2

Heap-based buffer overflow in the SPF_dns_resolv_lookup function in Spf_dns_resolv.c in libspf2 before 1.2.8 allows remote attackers to execute arbitrary code via a long DNS TXT record with a modified length field. Desbordamiento de búfer basado en montículo en la función SPF_dns_resolv_lookup en Spf_dns_resolv.c en libspf2 antes de 1.2.8 permite a atacantes remotos ejecutar código de su elección mediante un archivo DNS TXT largo con un campo longitud modificado. • https://www.exploit-db.com/exploits/6805 http://bugs.gentoo.org/show_bug.cgi?format=multiple&id=242254 http://secunia.com/advisories/32396 http://secunia.com/advisories/32450 http://secunia.com/advisories/32496 http://secunia.com/advisories/32720 http://security.gentoo.org/glsa/glsa-200810-03.xml http://securityreason.com/securityalert/4487 http://up2date.astaro.com/2008/11/up2date_7305_released.html http://www.debian.org/security/2008/dsa-1659 http://www.doxpara.com/ • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 6.4EPSS: 2%CPEs: 1EXPL: 0

Format string vulnerability in ANSI C Sender Policy Framework library (libspf) before 1.0.0-p5, when debugging is enabled, allows remote attackers to execute arbitrary code via format string specifiers, possibly in an e-mail address. • http://permalink.gmane.org/gmane.mail.spam.spf.devel/849 http://www.gossamer-threads.com/lists/spf/devel/27053?page=last http://www.libspf.org/index.html http://www.vupen.com/english/advisories/2006/1846 https://exchange.xforce.ibmcloud.com/vulnerabilities/26535 •