Buffer overflow in the ndp_msg_opt_dnssl_domain function in libndp allows remote routers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted DNS Search List (DNSSL) in an IPv6 router advertisement.
References
Link | Resource |
---|---|
http://www.openwall.com/lists/oss-security/2014/07/29/2 | Mailing List Patch Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=1118583 | Issue Tracking Patch Third Party Advisory |
http://www.securityfocus.com/bid/68945 | Third Party Advisory VDB Entry |
https://exchange.xforce.ibmcloud.com/vulnerabilities/94927 | Third Party Advisory VDB Entry |
Configurations
Information
Published : 2014-07-31 07:55
Updated : 2021-10-12 07:28
NVD link : CVE-2014-3554
Mitre link : CVE-2014-3554
JSON object : View
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Products Affected
libndp
- libndp