CVE-2008-2469
Published Oct 23, 2008
Last updated 7 years ago
Overview
- Description
- Heap-based buffer overflow in the SPF_dns_resolv_lookup function in Spf_dns_resolv.c in libspf2 before 1.2.8 allows remote attackers to execute arbitrary code via a long DNS TXT record with a modified length field.
- Source
- cret@cert.org
- NVD status
- Modified
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 10
- Impact score
- 10
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:C/I:C/A:C
Weaknesses
- nvd@nist.gov
- CWE-119
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:libspf:libspf2:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D84281EF-A1B8-43C1-B1EA-1AA3D6EFF71C", "versionEndIncluding": "1.2.7" }, { "criteria": "cpe:2.3:a:libspf:libspf2:1.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6916DA20-4EAE-4AB7-B0D8-8E711DA87D9B" }, { "criteria": "cpe:2.3:a:libspf:libspf2:1.0.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9B66D6DC-EB51-48A0-B157-70962F05DC6F" }, { "criteria": "cpe:2.3:a:libspf:libspf2:1.0.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E9927C3A-B001-4B95-A65C-8C86449E71F2" }, { "criteria": "cpe:2.3:a:libspf:libspf2:1.2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B857F114-B720-493C-8E57-965D1C56C550" }, { "criteria": "cpe:2.3:a:libspf:libspf2:1.2.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "66AFDC69-65BE-477A-A9E5-1B7C51E120EE" }, { "criteria": "cpe:2.3:a:libspf:libspf2:1.2.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8A115543-F06C-4C45-97BE-62A603AD6FD5" }, { "criteria": "cpe:2.3:a:libspf:libspf2:1.2.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5A946E9A-F440-4772-9939-553A883FEE6A" }, { "criteria": "cpe:2.3:a:libspf:libspf2:1.2.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0FF0F5AF-854F-4270-A33B-0D7B06E83639" } ], "operator": "OR" } ] } ]