CVE-2025-26519
- EPSS 0.01%
- Veröffentlicht 14.02.2025 04:15:09
- Zuletzt bearbeitet 14.02.2025 17:15:23
musl libc 0.9.13 through 1.2.5 before 1.2.6 has an out-of-bounds write vulnerability when an attacker can trigger iconv conversion of untrusted EUC-KR text to UTF-8.
CVE-2020-28928
- EPSS 0.03%
- Veröffentlicht 24.11.2020 18:15:12
- Zuletzt bearbeitet 21.11.2024 05:23:18
In musl libc through 1.2.1, wcsnrtombs mishandles particular combinations of destination buffer size and source character limit, as demonstrated by an invalid write access (buffer overflow).
CVE-2014-3484
- EPSS 1.79%
- Veröffentlicht 20.02.2020 04:15:10
- Zuletzt bearbeitet 21.11.2024 02:08:12
Multiple stack-based buffer overflows in the __dn_expand function in network/dn_expand.c in musl libc 1.1x before 1.1.2 and 0.9.13 through 1.0.3 allow remote attackers to (1) have unspecified impact via an invalid name length in a DNS response or (2)...
CVE-2019-14697
- EPSS 0.21%
- Veröffentlicht 06.08.2019 16:15:11
- Zuletzt bearbeitet 21.11.2024 04:27:09
musl libc through 1.1.23 has an x87 floating-point stack adjustment imbalance, related to the math/i386/ directory. In some cases, use of this library could introduce out-of-bounds writes that are not present in an application's source code.
CVE-2017-15650
- EPSS 0.63%
- Veröffentlicht 19.10.2017 23:29:00
- Zuletzt bearbeitet 20.04.2025 01:37:25
musl libc before 1.1.17 has a buffer overflow via crafted DNS replies because dns_parse_callback in network/lookup_name.c does not restrict the number of addresses, and thus an attacker can provide an unexpected number by sending A records in a reply...
CVE-2015-1817
- EPSS 0.45%
- Veröffentlicht 18.08.2017 16:29:00
- Zuletzt bearbeitet 20.04.2025 01:37:25
Stack-based buffer overflow in the inet_pton function in network/inet_pton.c in musl libc 0.9.15 through 1.0.4, and 1.1.0 through 1.1.7 allows attackers to have unspecified impact via unknown vectors.