Oval Definition:oval:org.mitre.oval:def:7542
Revision Date:2014-06-23Version:18
Title:DSA-1795 ldns -- buffer overflow
Description:Stefan Kaltenbrunner discovered that ldns, a library and set of utilities to facilitate DNS programming, did not correctly implement a buffer boundary check in its RR DNS record parser. This weakness could enable overflow of a heap buffer if a maliciously-crafted record is parsed, potentially allowing the execution of arbitrary code. The scope of compromise will vary with the context in which ldns is used, and could present either a local or remote attack vector. The old stable distribution (etch) is not affected by this issue.
Family:unixClass:patch
Status:ACCEPTEDReference(s):CVE-2009-1086
DSA-1795
Platform(s):Debian GNU/Linux 5.0
Product(s):ldns
Definition Synopsis
  • Debian GNU/Linux 5.0 is installed
  • AND Supported architectures section
  • Installed architecture is s390
  • OR Installed architecture is amd64
  • OR Installed architecture is sparc
  • OR Installed architecture is arm
  • OR Installed architecture is i386
  • OR Installed architecture is armel
  • OR Installed architecture is mips
  • OR Installed architecture is ia64
  • OR Installed architecture is alpha
  • OR Installed architecture is powerpc
  • OR Installed architecture is mipsel
  • OR Installed architecture is hppa
  • AND Packages section
  • libldns-dev is earlier than 1.4.0-1+lenny1
  • OR ldnsutils is earlier than 1.4.0-1+lenny1
  • OR libldns1 is earlier than 1.4.0-1+lenny1
  • BACK