Vulnerability Description
The DNS::GetResult function in dns.cpp in InspIRCd before 2.0.19 allows remote DNS servers to cause a denial of service (netsplit) via an invalid character in a PTR response, as demonstrated by a "\032" (whitespace) character in a hostname.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Debian | Debian Linux | 7.0 |
| Inspircd | Inspircd | <= 2.0.18 |
Related Weaknesses (CWE)
References
- http://www.debian.org/security/2016/dsa-3527Vendor Advisory
- http://www.inspircd.org/2015/04/16/v2019-released.htmlVendor Advisory
- https://github.com/inspircd/inspircd/commit/6058483d9fbc1b904d5ae7cfea47bfcde5c5Exploit
- https://github.com/inspircd/inspircd/issues/1033Exploit
- https://security.gentoo.org/glsa/201512-13
- http://www.debian.org/security/2016/dsa-3527Vendor Advisory
- http://www.inspircd.org/2015/04/16/v2019-released.htmlVendor Advisory
- https://github.com/inspircd/inspircd/commit/6058483d9fbc1b904d5ae7cfea47bfcde5c5Exploit
- https://github.com/inspircd/inspircd/issues/1033Exploit
- https://security.gentoo.org/glsa/201512-13
FAQ
What is CVE-2015-8702?
CVE-2015-8702 is a vulnerability with a CVSS score of 8.6 (HIGH). The DNS::GetResult function in dns.cpp in InspIRCd before 2.0.19 allows remote DNS servers to cause a denial of service (netsplit) via an invalid character in a PTR response, as demonstrated by a "\03...
How severe is CVE-2015-8702?
CVE-2015-8702 has been rated HIGH with a CVSS base score of 8.6/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2015-8702?
Check the references section above for vendor advisories and patch information. Affected products include: Debian Debian Linux, Inspircd Inspircd.