Nlnetlabs

Ldns

7 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.19%
  • Veröffentlicht 21.01.2022 15:15:07
  • Zuletzt bearbeitet 21.11.2024 05:09:26

When a zone file in ldns 1.7.1 is parsed, the function ldns_nsec3_salt_data is too trusted for the length value obtained from the zone file. When the memcpy is copied, the 0xfe - ldns_rdf_size(salt_rdf) byte data can be copied, causing heap overflow ...

Exploit
  • EPSS 0.11%
  • Veröffentlicht 21.01.2022 14:15:07
  • Zuletzt bearbeitet 21.11.2024 05:09:26

When ldns version 1.7.1 verifies a zone file, the ldns_rr_new_frm_str_internal function has a heap out of bounds read vulnerability. An attacker can leak information on the heap by constructing a zone file payload.

  • EPSS 0.55%
  • Veröffentlicht 17.11.2017 04:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

A double-free vulnerability in parse.c in ldns 1.7.0 have unspecified impact and attack vectors.

Exploit
  • EPSS 0.49%
  • Veröffentlicht 17.11.2017 04:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

A double-free vulnerability in str2host.c in ldns 1.7.0 have unspecified impact and attack vectors.

  • EPSS 0.15%
  • Veröffentlicht 16.11.2014 01:59:03
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The ldns-keygen tool in ldns 1.6.x uses the current umask to set the privileges of the private key, which might allow local users to obtain the private key by reading the file.

  • EPSS 4.07%
  • Veröffentlicht 04.11.2011 21:55:06
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Heap-based buffer overflow in the ldns_rr_new_frm_str_internal function in ldns before 1.6.11 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a Resource Record (RR) with an unknown type containing ...

  • EPSS 3.41%
  • Veröffentlicht 25.03.2009 18:30:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Heap-based buffer overflow in the ldns_rr_new_frm_str_internal function in ldns 1.4.x allows remote attackers to cause a denial of service (memory corruption) and possibly execute arbitrary code via a DNS resource record (RR) with a long (1) class fi...