CVE-2007-1465
Published Mar 24, 2007
Last updated 7 years ago
Overview
- Description
- Stack-based buffer overflow in dproxy.c for dproxy 0.1 through 0.5 allows remote attackers to execute arbitrary code via a long DNS query packet to UDP port 53.
- Source
- cve@mitre.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 10
- Impact score
- 10
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:C/I:C/A:C
Weaknesses
- nvd@nist.gov
- NVD-CWE-Other
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:dproxy:dproxy:0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "73F59CA4-7FD0-4D84-82AC-EF56E56C3BD4" }, { "criteria": "cpe:2.3:a:dproxy:dproxy:0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AA03B241-675A-4EDB-AD2D-CB45C1A3F2A4" }, { "criteria": "cpe:2.3:a:dproxy:dproxy:0.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A7C8D4CB-2B86-462B-AA23-386E41947C8C" }, { "criteria": "cpe:2.3:a:dproxy:dproxy:0.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "52BFD5FD-4680-4476-9DC1-06338B3532D4" }, { "criteria": "cpe:2.3:a:dproxy:dproxy:0.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "762C167B-C647-4795-BBA0-F55358039861" } ], "operator": "OR" } ] } ]