Vulnerability Details : CVE-2009-1086
Heap-based buffer overflow in the ldns_rr_new_frm_str_internal function in ldns 1.4.x allows remote attackers to cause a denial of service (memory corruption) and possibly execute arbitrary code via a DNS resource record (RR) with a long (1) class field (clas variable) and possibly (2) TTL field.
Vulnerability category: OverflowMemory CorruptionExecute codeDenial of service
Exploit prediction scoring system (EPSS) score for CVE-2009-1086
Probability of exploitation activity in the next 30 days: 11.17%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 95 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2009-1086
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
6.4
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:P/A:P |
10.0
|
4.9
|
NIST |
CWE ids for CVE-2009-1086
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2009-1086
- http://lists.opensuse.org/opensuse-security-announce/2009-05/msg00000.html
-
http://www.securityfocus.com/bid/34233
-
http://www.nlnetlabs.nl/bugs/show_bug.cgi?id=232
-
http://www.debian.org/security/2009/dsa-1795
-
http://www.openwall.com/lists/oss-security/2009/03/24/4
-
http://www.nlnetlabs.nl/svn/ldns/tags/release-1.5.0/Changelog
Products affected by CVE-2009-1086
- cpe:2.3:a:nlnetlabs:ldns:1.4.1:*:*:*:*:*:*:*
- cpe:2.3:a:nlnetlabs:ldns:1.4.0:*:*:*:*:*:*:*