Vulnerability Description
In tinysvcmdns through 2018-01-16, a maliciously crafted mDNS (Multicast DNS) packet triggers an infinite loop while parsing an mDNS query. When mDNS compressed labels point to each other, the function uncompress_nlabel goes into an infinite loop trying to analyze the packet with an mDNS query. As a result, the mDNS server hangs after receiving the malicious mDNS packet. NOTE: the product's web site states "This project is un-maintained, and has been since 2013. ... There are known vulnerabilities ... You are advised to NOT use this library for any new projects / products."
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Tinysvcmdns Project | Tinysvcmdns | <= 2018-01-16 |
Related Weaknesses (CWE)
References
- https://bitbucket.org/geekman/tinysvcmdns/issues/11/denial-of-service-vulnerabilExploitThird Party Advisory
- https://bitbucket.org/geekman/tinysvcmdns/issues/11/denial-of-service-vulnerabilExploitThird Party Advisory
FAQ
What is CVE-2019-9747?
CVE-2019-9747 is a vulnerability with a CVSS score of 7.5 (HIGH). In tinysvcmdns through 2018-01-16, a maliciously crafted mDNS (Multicast DNS) packet triggers an infinite loop while parsing an mDNS query. When mDNS compressed labels point to each other, the functio...
How severe is CVE-2019-9747?
CVE-2019-9747 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2019-9747?
Check the references section above for vendor advisories and patch information. Affected products include: Tinysvcmdns Project Tinysvcmdns.