CVE-2014-3484
Severity CVSS v4.0:
Pending analysis
Type:
CWE-787
Out-of-bounds Write
Publication date:
20/02/2020
Last modified:
28/02/2020
Description
Multiple stack-based buffer overflows in the __dn_expand function in network/dn_expand.c in musl libc 1.1x before 1.1.2 and 0.9.13 through 1.0.3 allow remote attackers to (1) have unspecified impact via an invalid name length in a DNS response or (2) cause a denial of service (crash) via an invalid name length in a DNS response, related to an infinite loop with no output.
Impact
Base Score 3.x
9.80
Severity 3.x
CRITICAL
Base Score 2.0
7.50
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:musl-libc:musl:*:*:*:*:*:*:*:* | 0.9.13 (including) | 1.0.3 (including) |
| cpe:2.3:a:musl-libc:musl:*:*:*:*:*:*:*:* | 1.1.0 (including) | 1.1.2 (excluding) |
To consult the complete list of CPE names with products and versions, see this page



