Vulnerability Description
dns2tcp before 0.4.1 does not properly handle negative values in a certain length field in the input argument to the (1) dns_simple_decode or (2) dns_decode function, which allows remote attackers to overwrite a buffer and have unspecified other impact.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Hsc | Dns2Tcp | <= 0.4 |
Related Weaknesses (CWE)
References
- http://www.hsc.fr/ressources/outils/dns2tcp/index.html.en
- http://www.openwall.com/lists/oss-security/2008/09/03/5Exploit
- http://www.securityfocus.com/bid/31080
- https://exchange.xforce.ibmcloud.com/vulnerabilities/44974
- http://www.hsc.fr/ressources/outils/dns2tcp/index.html.en
- http://www.openwall.com/lists/oss-security/2008/09/03/5Exploit
- http://www.securityfocus.com/bid/31080
- https://exchange.xforce.ibmcloud.com/vulnerabilities/44974
FAQ
What is CVE-2008-3910?
CVE-2008-3910 is a vulnerability with a CVSS score of 10.0 (HIGH). dns2tcp before 0.4.1 does not properly handle negative values in a certain length field in the input argument to the (1) dns_simple_decode or (2) dns_decode function, which allows remote attackers to ...
How severe is CVE-2008-3910?
CVE-2008-3910 has been rated HIGH with a CVSS base score of 10.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2008-3910?
Check the references section above for vendor advisories and patch information. Affected products include: Hsc Dns2Tcp.