1 results (0.001 seconds)

CVSS: 10.0EPSS: 91%CPEs: 9EXPL: 2

Heap-based buffer overflow in the SPF_dns_resolv_lookup function in Spf_dns_resolv.c in libspf2 before 1.2.8 allows remote attackers to execute arbitrary code via a long DNS TXT record with a modified length field. Desbordamiento de búfer basado en montículo en la función SPF_dns_resolv_lookup en Spf_dns_resolv.c en libspf2 antes de 1.2.8 permite a atacantes remotos ejecutar código de su elección mediante un archivo DNS TXT largo con un campo longitud modificado. • https://www.exploit-db.com/exploits/6805 http://bugs.gentoo.org/show_bug.cgi?format=multiple&id=242254 http://secunia.com/advisories/32396 http://secunia.com/advisories/32450 http://secunia.com/advisories/32496 http://secunia.com/advisories/32720 http://security.gentoo.org/glsa/glsa-200810-03.xml http://securityreason.com/securityalert/4487 http://up2date.astaro.com/2008/11/up2date_7305_released.html http://www.debian.org/security/2008/dsa-1659 http://www.doxpara.com/ • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •