CVE-2011-3581
Severity CVSS v4.0:
Pending analysis
Type:
CWE-119
Buffer Errors
Publication date:
04/11/2011
Last modified:
11/04/2025
Description
Heap-based buffer overflow in the ldns_rr_new_frm_str_internal function in ldns before 1.6.11 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a Resource Record (RR) with an unknown type containing input that is longer than a specified length.
Impact
Base Score 2.0
6.80
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:nlnetlabs:ldns:*:*:*:*:*:*:*:* | 1.6.10 (including) | |
| cpe:2.3:a:nlnetlabs:ldns:0.50:*:*:*:*:*:*:* | ||
| cpe:2.3:a:nlnetlabs:ldns:0.60:*:*:*:*:*:*:* | ||
| cpe:2.3:a:nlnetlabs:ldns:0.65:*:*:*:*:*:*:* | ||
| cpe:2.3:a:nlnetlabs:ldns:0.66:*:*:*:*:*:*:* | ||
| cpe:2.3:a:nlnetlabs:ldns:0.70:*:*:*:*:*:*:* | ||
| cpe:2.3:a:nlnetlabs:ldns:1.0.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:nlnetlabs:ldns:1.1.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:nlnetlabs:ldns:1.2.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:nlnetlabs:ldns:1.2.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:nlnetlabs:ldns:1.2.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:nlnetlabs:ldns:1.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:nlnetlabs:ldns:1.4.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:nlnetlabs:ldns:1.4.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:nlnetlabs:ldns:1.5.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://lists.fedoraproject.org/pipermail/package-announce/2011-October/068091.html
- http://lists.fedoraproject.org/pipermail/package-announce/2011-October/068201.html
- http://lists.fedoraproject.org/pipermail/package-announce/2011-October/068239.html
- http://lists.opensuse.org/opensuse-security-announce/2011-10/msg00008.html
- http://nlnetlabs.nl/svn/ldns/tags/release-1.6.11/Changelog
- http://seclists.org/oss-sec/2011/q3/503
- http://seclists.org/oss-sec/2011/q3/542
- http://secunia.com/advisories/46470
- http://secunia.com/advisories/46476
- http://www.nlnetlabs.nl/bugs-script/show_bug.cgi?id=403
- http://www.securityfocus.com/bid/49748
- http://lists.fedoraproject.org/pipermail/package-announce/2011-October/068091.html
- http://lists.fedoraproject.org/pipermail/package-announce/2011-October/068201.html
- http://lists.fedoraproject.org/pipermail/package-announce/2011-October/068239.html
- http://lists.opensuse.org/opensuse-security-announce/2011-10/msg00008.html
- http://nlnetlabs.nl/svn/ldns/tags/release-1.6.11/Changelog
- http://seclists.org/oss-sec/2011/q3/503
- http://seclists.org/oss-sec/2011/q3/542
- http://secunia.com/advisories/46470
- http://secunia.com/advisories/46476
- http://www.nlnetlabs.nl/bugs-script/show_bug.cgi?id=403
- http://www.securityfocus.com/bid/49748



