#VU44546 Heap-based buffer overflow in ldns - CVE-2011-3581
Published: November 4, 2011 / Updated: August 11, 2020
ldns
NLnet Labs
Description
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error in Heap-based buffer overflow in the ldns_rr_new_frm_str_internal function in ldns before 1.6.11. A remote attacker can use a Resource Record to trigger heap-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
Remediation
External links
- http://lists.fedoraproject.org/pipermail/package-announce/2011-October/068091.html
- http://lists.fedoraproject.org/pipermail/package-announce/2011-October/068201.html
- http://lists.fedoraproject.org/pipermail/package-announce/2011-October/068239.html
- http://lists.opensuse.org/opensuse-security-announce/2011-10/msg00008.html
- http://nlnetlabs.nl/svn/ldns/tags/release-1.6.11/Changelog
- http://seclists.org/oss-sec/2011/q3/503
- http://seclists.org/oss-sec/2011/q3/542
- http://secunia.com/advisories/46470
- http://secunia.com/advisories/46476
- http://www.nlnetlabs.nl/bugs-script/show_bug.cgi?id=403
- http://www.securityfocus.com/bid/49748