9.8
CVSSv3

CVE-2014-3484

Published: 20/02/2020 Updated: 28/02/2020
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Multiple stack-based buffer overflows in the __dn_expand function in network/dn_expand.c in musl libc 1.1x prior to 1.1.2 and 0.9.13 up to and including 1.0.3 allow remote malicious users to (1) have unspecified impact via an invalid name length in a DNS response or (2) cause a denial of service (crash) via an invalid name length in a DNS response, related to an infinite loop with no output.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

musl-libc musl

Vendor Advisories

Debian Bug report logs - #750815 musl: CVE-2014-3484: remote stack-based buffer overflow in DNS response Package: src:musl; Maintainer for src:musl is Reiner Herrmann <reiner@reiner-hde>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Sat, 7 Jun 2014 06:27:02 UTC Severity: grave Tags: fixed-upstream, s ...