CVE-2008-2357
21.05.2008, 13:24
Stack-based buffer overflow in the split_redraw function in split.c in mtr before 0.73, when invoked with the -p (aka --split) option, allows remote attackers to execute arbitrary code via a crafted DNS PTR record. NOTE: it could be argued that this is a vulnerability in the ns_name_ntop function in resolv/ns_name.c in glibc and the proper fix should be in glibc; if so, then this should not be treated as a vulnerability in mtr.Enginsight
Vendor | Product | Version |
---|---|---|
matt_kimball_and_roger_wolff | mtr | 𝑥 ≤ 0.72 |
matt_kimball_and_roger_wolff | mtr | 0.21 |
matt_kimball_and_roger_wolff | mtr | 0.22 |
matt_kimball_and_roger_wolff | mtr | 0.23 |
matt_kimball_and_roger_wolff | mtr | 0.24 |
matt_kimball_and_roger_wolff | mtr | 0.25 |
matt_kimball_and_roger_wolff | mtr | 0.26 |
matt_kimball_and_roger_wolff | mtr | 0.27 |
matt_kimball_and_roger_wolff | mtr | 0.28 |
matt_kimball_and_roger_wolff | mtr | 0.29 |
matt_kimball_and_roger_wolff | mtr | 0.30 |
matt_kimball_and_roger_wolff | mtr | 0.31 |
matt_kimball_and_roger_wolff | mtr | 0.32 |
matt_kimball_and_roger_wolff | mtr | 0.33 |
matt_kimball_and_roger_wolff | mtr | 0.34 |
matt_kimball_and_roger_wolff | mtr | 0.35 |
matt_kimball_and_roger_wolff | mtr | 0.36 |
matt_kimball_and_roger_wolff | mtr | 0.37 |
matt_kimball_and_roger_wolff | mtr | 0.38 |
matt_kimball_and_roger_wolff | mtr | 0.39 |
matt_kimball_and_roger_wolff | mtr | 0.40 |
matt_kimball_and_roger_wolff | mtr | 0.41 |
matt_kimball_and_roger_wolff | mtr | 0.42 |
matt_kimball_and_roger_wolff | mtr | 0.43 |
matt_kimball_and_roger_wolff | mtr | 0.44 |
matt_kimball_and_roger_wolff | mtr | 0.45 |
matt_kimball_and_roger_wolff | mtr | 0.46 |
matt_kimball_and_roger_wolff | mtr | 0.47 |
matt_kimball_and_roger_wolff | mtr | 0.48 |
matt_kimball_and_roger_wolff | mtr | 0.49 |
matt_kimball_and_roger_wolff | mtr | 0.50 |
matt_kimball_and_roger_wolff | mtr | 0.51 |
matt_kimball_and_roger_wolff | mtr | 0.52 |
matt_kimball_and_roger_wolff | mtr | 0.53 |
matt_kimball_and_roger_wolff | mtr | 0.54 |
matt_kimball_and_roger_wolff | mtr | 0.55 |
matt_kimball_and_roger_wolff | mtr | 0.56 |
matt_kimball_and_roger_wolff | mtr | 0.57 |
matt_kimball_and_roger_wolff | mtr | 0.58 |
matt_kimball_and_roger_wolff | mtr | 0.59 |
matt_kimball_and_roger_wolff | mtr | 0.60 |
matt_kimball_and_roger_wolff | mtr | 0.61 |
matt_kimball_and_roger_wolff | mtr | 0.62 |
matt_kimball_and_roger_wolff | mtr | 0.63 |
matt_kimball_and_roger_wolff | mtr | 0.64 |
matt_kimball_and_roger_wolff | mtr | 0.65 |
matt_kimball_and_roger_wolff | mtr | 0.66 |
matt_kimball_and_roger_wolff | mtr | 0.67 |
matt_kimball_and_roger_wolff | mtr | 0.68 |
matt_kimball_and_roger_wolff | mtr | 0.69 |
matt_kimball_and_roger_wolff | mtr | 0.70 |
matt_kimball_and_roger_wolff | mtr | 0.71 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Common Weakness Enumeration
References