Stack-based buffer overflow in dproxy.c for dproxy 0.1 through 0.5 allows remote attackers to execute arbitrary code via a long DNS query packet to UDP port 53.
Link | Tags |
---|---|
http://secunia.com/advisories/24623 | third party advisory |
http://seclists.org/fulldisclosure/2007/Mar/0409.html | mailing list exploit vendor advisory |
https://www.cynops.de/advisories/CVE-2007-1465.txt | exploit vendor advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/33171 | vdb entry |
http://www.securityfocus.com/bid/23112 | vdb entry |
http://osvdb.org/34449 | vdb entry |
http://www.vupen.com/english/advisories/2007/1091 | vdb entry |