Buffer overflow in the ndp_msg_opt_dnssl_domain function in libndp allows remote routers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted DNS Search List (DNSSL) in an IPv6 router advertisement.
The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow.
Link | Tags |
---|---|
http://www.openwall.com/lists/oss-security/2014/07/29/2 | patch mailing list third party advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/94927 | third party advisory vdb entry |
http://www.securityfocus.com/bid/68945 | third party advisory vdb entry |
https://bugzilla.redhat.com/show_bug.cgi?id=1118583 | patch third party advisory issue tracking |