8.3 High
AI Score
Confidence
Low
9 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:S/C:C/I:C/A:C
0.093 Low
EPSS
Percentile
94.6%
Multiple buffer overflows in MyDNS 1.1.0 allow remote attackers to (1) cause a denial of service (daemon crash) and possibly execute arbitrary code via a certain update, which triggers a heap-based buffer overflow in update.c; and (2) cause a denial of service (daemon crash) via unspecified vectors that trigger an off-by-one stack-based buffer overflow in update.c.
CPE | Name | Operator | Version |
---|---|---|---|
don_moore:mydns | don moore mydns | eq | 1.1.0 |
lists.grok.org.uk/pipermail/full-disclosure/2007-April/054024.html
osvdb.org/35438
osvdb.org/35439
secunia.com/advisories/25007
secunia.com/advisories/28086
securityreason.com/securityalert/2658
www.debian.org/security/2007/dsa-1434
www.digit-labs.org/files/exploits/mydns-rr-smash.c
www.digit-labs.org/files/patches/mydns-update.c.diff
www.securityfocus.com/bid/23694
www.vupen.com/english/advisories/2007/1561
exchange.xforce.ibmcloud.com/vulnerabilities/33933