{"osvdb": [{"lastseen": "2017-04-28T13:20:03", "bulletinFamily": "software", "description": "## Vulnerability Description\nA remote overflow exists in talkd. The talkd fails to check bounds on the buffer where the hostname is stored resulting in a stack space overflow. With a specially crafted DNS entry, an attacker can cause remote execution of arbitrary commands with root privileges resulting in a loss of integrity.\n## Solution Description\nUpgrade to an unaffected version (see external references for your system). It is also possible to correct the flaw by implementing the following workaround: Disable talkd.\n## Short Description\nA remote overflow exists in talkd. The talkd fails to check bounds on the buffer where the hostname is stored resulting in a stack space overflow. With a specially crafted DNS entry, an attacker can cause remote execution of arbitrary commands with root privileges resulting in a loss of integrity.\n## References:\n[Vendor Specific Advisory URL](http://www.securityfocus.com/advisories/1501)\n[Vendor Specific Advisory URL](ftp://patches.sgi.com/support/free/security/advisories/19970701-01-PX)\n[Vendor Specific Advisory URL](http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/147&type=0&nav=sec.sba)\n[Vendor Specific Advisory URL](ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/old/FreeBSD-SA-96:21.talkd.asc)\nOther Advisory URL: http://www.auscert.org.au/render.html?it=1875&cid=1\nISS X-Force ID: 453\n[CVE-1999-0048](https://vulners.com/cve/CVE-1999-0048)\nCERT: CA-1997-04\nBugtraq ID: 210\n", "modified": "1997-01-18T00:00:00", "published": "1997-01-18T00:00:00", "href": "https://vulners.com/osvdb/OSVDB:8203", "id": "OSVDB:8203", "type": "osvdb", "title": "Multiple Vendor in.talkd Crafted DNS Response Remote Overflow", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}]}