Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <Pine.GSO.4.51.0903252024510.11191@faron.mitre.org>
Date: Wed, 25 Mar 2009 20:24:56 -0400 (EDT)
From: "Steven M. Christey" <coley@...us.mitre.org>
To: oss-security@...ts.openwall.com
cc: coley@...re.org
Subject: Re: CVE id request: ldns


======================================================
Name: CVE-2009-1086
Status: Candidate
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1086
Reference: MLIST:[oss-security] 20090324 CVE id request: ldns
Reference: URL:http://www.openwall.com/lists/oss-security/2009/03/24/4
Reference: MISC:http://www.nlnetlabs.nl/bugs/show_bug.cgi?id=232

Heap-based buffer overflow in the ldns_rr_new_frm_str_internal
function in ldns 1.4.x allows remote attackers to cause a denial of
service (memory corruption) and possibly execute arbitrary code via a
DNS resource record (RR) with a long (1) class field (clas variable)
and possibly (2) TTL field.


Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.