MGASA-2018-0255

Source
https://advisories.mageia.org/MGASA-2018-0255.html
Import Source
https://advisories.mageia.org/MGASA-2018-0255.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2018-0255
Related
Published
2018-05-24T16:30:31Z
Modified
2018-05-24T15:51:31Z
Summary
Updated pdns packages fix security vulnerability
Details

A stack-based buffer overflow in the dnsreplay tool occurring when replaying a specially crafted PCAP file with the --ecs-stamp option enabled, leading to a denial of service or potentially arbitrary code execution (CVE-2018-1046).

References
Credits

Affected packages

Mageia:6 / pdns

Package

Name
pdns
Purl
pkg:rpm/mageia/pdns?distro=mageia-6

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.1.2-1.mga6

Ecosystem specific

{
    "section": "core"
}