Lucene search

K
cve[email protected]CVE-2008-2357
HistoryMay 21, 2008 - 1:24 p.m.

CVE-2008-2357

2008-05-2113:24:00
CWE-119
web.nvd.nist.gov
31
cve
2008
2357
stack-based buffer overflow
mtr
split_redraw
dns ptr record
remote code execution
vulnerability
glibc

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

7.6 High

AI Score

Confidence

Low

0.128 Low

EPSS

Percentile

95.5%

Stack-based buffer overflow in the split_redraw function in split.c in mtr before 0.73, when invoked with the -p (aka --split) option, allows remote attackers to execute arbitrary code via a crafted DNS PTR record. NOTE: it could be argued that this is a vulnerability in the ns_name_ntop function in resolv/ns_name.c in glibc and the proper fix should be in glibc; if so, then this should not be treated as a vulnerability in mtr.

Affected configurations

NVD
Node
matt_kimball_and_roger_wolffmtrRange0.72
OR
matt_kimball_and_roger_wolffmtrMatch0.21
OR
matt_kimball_and_roger_wolffmtrMatch0.22
OR
matt_kimball_and_roger_wolffmtrMatch0.23
OR
matt_kimball_and_roger_wolffmtrMatch0.24
OR
matt_kimball_and_roger_wolffmtrMatch0.25
OR
matt_kimball_and_roger_wolffmtrMatch0.26
OR
matt_kimball_and_roger_wolffmtrMatch0.27
OR
matt_kimball_and_roger_wolffmtrMatch0.28
OR
matt_kimball_and_roger_wolffmtrMatch0.29
OR
matt_kimball_and_roger_wolffmtrMatch0.30
OR
matt_kimball_and_roger_wolffmtrMatch0.31
OR
matt_kimball_and_roger_wolffmtrMatch0.32
OR
matt_kimball_and_roger_wolffmtrMatch0.33
OR
matt_kimball_and_roger_wolffmtrMatch0.34
OR
matt_kimball_and_roger_wolffmtrMatch0.35
OR
matt_kimball_and_roger_wolffmtrMatch0.36
OR
matt_kimball_and_roger_wolffmtrMatch0.37
OR
matt_kimball_and_roger_wolffmtrMatch0.38
OR
matt_kimball_and_roger_wolffmtrMatch0.39
OR
matt_kimball_and_roger_wolffmtrMatch0.40
OR
matt_kimball_and_roger_wolffmtrMatch0.41
OR
matt_kimball_and_roger_wolffmtrMatch0.42
OR
matt_kimball_and_roger_wolffmtrMatch0.43
OR
matt_kimball_and_roger_wolffmtrMatch0.44
OR
matt_kimball_and_roger_wolffmtrMatch0.45
OR
matt_kimball_and_roger_wolffmtrMatch0.46
OR
matt_kimball_and_roger_wolffmtrMatch0.47
OR
matt_kimball_and_roger_wolffmtrMatch0.48
OR
matt_kimball_and_roger_wolffmtrMatch0.49
OR
matt_kimball_and_roger_wolffmtrMatch0.50
OR
matt_kimball_and_roger_wolffmtrMatch0.51
OR
matt_kimball_and_roger_wolffmtrMatch0.52
OR
matt_kimball_and_roger_wolffmtrMatch0.53
OR
matt_kimball_and_roger_wolffmtrMatch0.54
OR
matt_kimball_and_roger_wolffmtrMatch0.55
OR
matt_kimball_and_roger_wolffmtrMatch0.56
OR
matt_kimball_and_roger_wolffmtrMatch0.57
OR
matt_kimball_and_roger_wolffmtrMatch0.58
OR
matt_kimball_and_roger_wolffmtrMatch0.59
OR
matt_kimball_and_roger_wolffmtrMatch0.60
OR
matt_kimball_and_roger_wolffmtrMatch0.61
OR
matt_kimball_and_roger_wolffmtrMatch0.62
OR
matt_kimball_and_roger_wolffmtrMatch0.63
OR
matt_kimball_and_roger_wolffmtrMatch0.64
OR
matt_kimball_and_roger_wolffmtrMatch0.65
OR
matt_kimball_and_roger_wolffmtrMatch0.66
OR
matt_kimball_and_roger_wolffmtrMatch0.67
OR
matt_kimball_and_roger_wolffmtrMatch0.68
OR
matt_kimball_and_roger_wolffmtrMatch0.69
OR
matt_kimball_and_roger_wolffmtrMatch0.70
OR
matt_kimball_and_roger_wolffmtrMatch0.71

References

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

7.6 High

AI Score

Confidence

Low

0.128 Low

EPSS

Percentile

95.5%