CVE-2014-3484
20.02.2020, 04:15
Multiple stack-based buffer overflows in the __dn_expand function in network/dn_expand.c in musl libc 1.1x before 1.1.2 and 0.9.13 through 1.0.3 allow remote attackers to (1) have unspecified impact via an invalid name length in a DNS response or (2) cause a denial of service (crash) via an invalid name length in a DNS response, related to an infinite loop with no output.Enginsight
Vendor | Product | Version |
---|---|---|
musl-libc | musl | 0.9.13 ≤ 𝑥 ≤ 1.0.3 |
musl-libc | musl | 1.1.0 ≤ 𝑥 < 1.1.2 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Common Weakness Enumeration