10
CVSSv2

CVE-2008-2469

Published: 23/10/2008 Updated: 29/09/2017
CVSS v2 Base Score: 10 | Impact Score: 10 | Exploitability Score: 10
VMScore: 1000
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

Heap-based buffer overflow in the SPF_dns_resolv_lookup function in Spf_dns_resolv.c in libspf2 prior to 1.2.8 allows remote malicious users to execute arbitrary code via a long DNS TXT record with a modified length field.

Vulnerable Product Search on Vulmon Subscribe to Product

libspf libspf2 1.2.5

libspf libspf2 1.2.4

libspf libspf2 1.2.3

libspf libspf2 1.2.1

libspf libspf2 1.0.4

libspf libspf2 1.0.3

libspf libspf2

libspf libspf2 1.2.6

libspf libspf2 1.0.2

Exploits

Advisory: DNS TXT Record Parsing Bug in LibSPF2 Author: Dan Kaminsky, Director of Penetration Testing, IOActive Inc, DanKaminsky@ioactivecom (PGP Key In Appendix) Abstract: A relatively common bug parsing TXT records delivered over DNS, dating at least back to 2002 in Sendmail 820 and almost certainly much earlier, has been found in LibSPF2 ...