2 results (0.003 seconds)

CVSS: 10.0EPSS: 38%CPEs: 9EXPL: 2

23 Oct 2008 — Heap-based buffer overflow in the SPF_dns_resolv_lookup function in Spf_dns_resolv.c in libspf2 before 1.2.8 allows remote attackers to execute arbitrary code via a long DNS TXT record with a modified length field. Desbordamiento de búfer basado en montículo en la función SPF_dns_resolv_lookup en Spf_dns_resolv.c en libspf2 antes de 1.2.8 permite a atacantes remotos ejecutar código de su elección mediante un archivo DNS TXT largo con un campo longitud modificado. • https://www.exploit-db.com/exploits/6805 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 9.8EPSS: 1%CPEs: 1EXPL: 0

22 May 2006 — Format string vulnerability in ANSI C Sender Policy Framework library (libspf) before 1.0.0-p5, when debugging is enabled, allows remote attackers to execute arbitrary code via format string specifiers, possibly in an e-mail address. • http://permalink.gmane.org/gmane.mail.spam.spf.devel/849 •