Vulnerability Description
The set_ipv6() function in zscan_rfc1035.rl in gdnsd before 2.4.3 and 3.x before 3.2.1 has a stack-based buffer overflow via a long and malformed IPv6 address in zone data.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Gdnsd | Gdnsd | < 2.4.3 |
Related Weaknesses (CWE)
References
- https://github.com/gdnsd/gdnsd/issues/185ExploitPatchThird Party Advisory
- https://github.com/gdnsd/gdnsd/issues/185ExploitPatchThird Party Advisory
FAQ
What is CVE-2019-13952?
CVE-2019-13952 is a vulnerability with a CVSS score of 9.8 (CRITICAL). The set_ipv6() function in zscan_rfc1035.rl in gdnsd before 2.4.3 and 3.x before 3.2.1 has a stack-based buffer overflow via a long and malformed IPv6 address in zone data.
How severe is CVE-2019-13952?
CVE-2019-13952 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2019-13952?
Check the references section above for vendor advisories and patch information. Affected products include: Gdnsd Gdnsd.