6.8
CVSSv2

CVE-2011-3581

Published: 04/11/2011 Updated: 08/12/2016
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
VMScore: 605
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

Heap-based buffer overflow in the ldns_rr_new_frm_str_internal function in ldns prior to 1.6.11 allows remote malicious users to cause a denial of service (crash) and possibly execute arbitrary code via a Resource Record (RR) with an unknown type containing input that is longer than a specified length.

Vulnerable Product Search on Vulmon Subscribe to Product

nlnetlabs ldns 1.6.5

nlnetlabs ldns 1.6.4

nlnetlabs ldns 1.4.1

nlnetlabs ldns 1.4.0

nlnetlabs ldns 0.70

nlnetlabs ldns 1.6.9

nlnetlabs ldns 1.6.8

nlnetlabs ldns 1.6.1

nlnetlabs ldns 1.6.0

nlnetlabs ldns 1.2.1

nlnetlabs ldns 1.2.0

nlnetlabs ldns

nlnetlabs ldns 1.6.7

nlnetlabs ldns 1.6.6

nlnetlabs ldns 1.5.1

nlnetlabs ldns 1.5.0

nlnetlabs ldns 1.1.0

nlnetlabs ldns 1.0.0

nlnetlabs ldns 0.66

nlnetlabs ldns 1.6.3

nlnetlabs ldns 1.6.2

nlnetlabs ldns 1.3

nlnetlabs ldns 1.2.2

nlnetlabs ldns 0.65

nlnetlabs ldns 0.60

nlnetlabs ldns 0.50

Vendor Advisories

Debian Bug report logs - #647297 CVE-2011-3581: heap overflow flaw in ldns_rr_new_frm_str_internal() Package: ldns; Maintainer for ldns is Debian DNS Team <team+dns@trackerdebianorg>; Reported by: Moritz Muehlenhoff <muehlenhoff@univentionde> Date: Tue, 1 Nov 2011 17:30:02 UTC Severity: grave Tags: security Fixe ...
David Wheeler discovered a buffer overflow in ldns's code to parse RR records, which could lead to the execution of arbitrary code For the oldstable distribution (lenny), this problem has been fixed in version 140-1+lenny2 For the stable distribution (squeeze), this problem has been fixed in version 166-2+squeeze1 For the unstable distributi ...