musl libc before 1.1.17 has a buffer overflow via crafted DNS replies because dnsparsecallback in network/lookup_name.c does not restrict the number of addresses, and thus an attacker can provide an unexpected number by sending A records in a reply to an AAAA query.
[
{
"id": "CVE-2017-15650-0c40b056",
"source": "http://git.musl-libc.org/git/musl@45ca5d3fcb6f874bf5ba55d0e9651cef68515395",
"deprecated": false,
"signature_version": "v1",
"target": {
"file": "src/network/lookup_name.c"
},
"digest": {
"threshold": 0.9,
"line_hashes": [
"19105209796768762262057181071667862774",
"337813073784692095994138226666901462849",
"55846828187015184318840200573767133364",
"76903974613516892053616754843570385638"
]
},
"signature_type": "Line"
},
{
"id": "CVE-2017-15650-82c2c8f5",
"source": "http://git.musl-libc.org/git/musl@45ca5d3fcb6f874bf5ba55d0e9651cef68515395",
"deprecated": false,
"signature_version": "v1",
"target": {
"function": "dns_parse_callback",
"file": "src/network/lookup_name.c"
},
"digest": {
"length": 789.0,
"function_hash": "65063592785737742352495545225918919199"
},
"signature_type": "Function"
}
]