9.8
CVSSv3

CVE-2015-1817

Published: 18/08/2017 Updated: 29/08/2017
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Stack-based buffer overflow in the inet_pton function in network/inet_pton.c in musl libc 0.9.15 up to and including 1.0.4, and 1.1.0 up to and including 1.1.7 allows malicious users to have unspecified impact via unknown vectors.

Vulnerable Product Search on Vulmon Subscribe to Product

musl-libc musl 1.1.2

musl-libc musl 1.1.1

musl-libc musl 1.1.0

musl-libc musl 1.0.0

musl-libc musl 1.0.1

musl-libc musl 1.1.7

musl-libc musl 1.1.6

musl-libc musl 1.1.4

musl-libc musl 1.0.2

musl-libc musl 1.0.4

musl-libc musl 1.1.5

musl-libc musl 1.1.3

musl-libc musl 1.0.3

musl-libc musl 0.9.15

Vendor Advisories

Debian Bug report logs - #781497 musl: CVE-2015-1817: stack-based buffer overflow in ipv6 literal parsing Package: src:musl; Maintainer for src:musl is Reiner Herrmann <reiner@reiner-hde>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Mon, 30 Mar 2015 04:33:01 UTC Severity: grave Tags: fixed-upstream, ...