Vulnerability Name: | CVE-2017-9430 (CCN-126928) | ||||||||||||||||||||||||||||||||||||||||
Assigned: | 2017-06-05 | ||||||||||||||||||||||||||||||||||||||||
Published: | 2017-06-05 | ||||||||||||||||||||||||||||||||||||||||
Updated: | 2017-08-12 | ||||||||||||||||||||||||||||||||||||||||
Summary: | Stack-based buffer overflow in dnstracer through 1.9 allows attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a command line with a long name argument that is mishandled in a strcpy call for argv[0]. An example threat model is a web application that launches dnstracer with an untrusted name string. | ||||||||||||||||||||||||||||||||||||||||
CVSS v3 Severity: | 9.8 Critical (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) 8.9 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:U/RC:R)
4.8 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:U/RC:R)
| ||||||||||||||||||||||||||||||||||||||||
CVSS v2 Severity: | 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
| ||||||||||||||||||||||||||||||||||||||||
Vulnerability Type: | CWE-119 | ||||||||||||||||||||||||||||||||||||||||
Vulnerability Consequences: | Denial of Service | ||||||||||||||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2017-9430 Source: CCN Type: mavetju Web site Unix -> General Tools -> dnstracer Source: MISC Type: Third Party Advisory https://cxsecurity.com/issue/WLB-2017060030 Source: XF Type: UNKNOWN dnstracer-cve20179430-dos(126928) Source: CCN Type: Packet Storm Security [06-05-2017] DNSTracer 1.8.1 Buffer Overflow Source: MISC Type: Third Party Advisory https://packetstormsecurity.com/files/142799/DNSTracer-1.8.1-Buffer-Overflow.html Source: CCN Type: Packet Storm Security [08-04-2017] DNSTracer 1.9 Buffer Overflow Source: EXPLOIT-DB Type: Third Party Advisory 42115 Source: EXPLOIT-DB Type: EXPLOIT Offensive Security Exploit Database [08-03-2017] Source: EXPLOIT-DB Type: UNKNOWN 42424 | ||||||||||||||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1:![]() | ||||||||||||||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||||
BACK |