
CVE-2008-2469 – LibSPF2 < 1.2.8 - DNS TXT Record Parsing Bug Heap Overflow (PoC)
https://notcve.org/view.php?id=CVE-2008-2469
23 Oct 2008 — Heap-based buffer overflow in the SPF_dns_resolv_lookup function in Spf_dns_resolv.c in libspf2 before 1.2.8 allows remote attackers to execute arbitrary code via a long DNS TXT record with a modified length field. Desbordamiento de búfer basado en montículo en la función SPF_dns_resolv_lookup en Spf_dns_resolv.c en libspf2 antes de 1.2.8 permite a atacantes remotos ejecutar código de su elección mediante un archivo DNS TXT largo con un campo longitud modificado. • https://www.exploit-db.com/exploits/6805 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVE-2006-1520
https://notcve.org/view.php?id=CVE-2006-1520
22 May 2006 — Format string vulnerability in ANSI C Sender Policy Framework library (libspf) before 1.0.0-p5, when debugging is enabled, allows remote attackers to execute arbitrary code via format string specifiers, possibly in an e-mail address. • http://permalink.gmane.org/gmane.mail.spam.spf.devel/849 •