Stack-based buffer overflow in dnstracer up to and including 1.9 allows malicious users to cause a denial of service (application crash) or possibly have unspecified other impact via a command line with a long name argument that is mishandled in a strcpy call for argv[0]. An example threat model is a web application that launches dnstracer with an untrusted name string.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
dnstracer project dnstracer |