dns2tcp before 0.4.1 does not properly handle negative values in a certain length field in the input argument to the (1) dns_simple_decode or (2) dns_decode function, which allows remote attackers to overwrite a buffer and have unspecified other impact.
Weaknesses in this category are related to improper calculation or conversion of numbers.
Link | Tags |
---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/44974 | vdb entry |
http://www.openwall.com/lists/oss-security/2008/09/03/5 | mailing list exploit |
http://www.hsc.fr/ressources/outils/dns2tcp/index.html.en | |
http://www.securityfocus.com/bid/31080 | vdb entry |