Heap-based buffer overflow in the ldns_rr_new_frm_str_internal function in ldns 1.4.x allows remote attackers to cause a denial of service (memory corruption) and possibly execute arbitrary code via a DNS resource record (RR) with a long (1) class field (clas variable) and possibly (2) TTL field.
Weaknesses in this category are related to improper management of system resources.
Link | Tags |
---|---|
http://secunia.com/advisories/35013 | third party advisory |
http://www.openwall.com/lists/oss-security/2009/03/24/4 | mailing list |
http://www.securityfocus.com/bid/34233 | vdb entry |
http://www.nlnetlabs.nl/svn/ldns/tags/release-1.5.0/Changelog | |
http://secunia.com/advisories/35065 | third party advisory |
http://www.nlnetlabs.nl/bugs/show_bug.cgi?id=232 | |
http://lists.opensuse.org/opensuse-security-announce/2009-05/msg00000.html | vendor advisory |
http://www.debian.org/security/2009/dsa-1795 | vendor advisory |