Vulnerability Details : CVE-2011-3581
Heap-based buffer overflow in the ldns_rr_new_frm_str_internal function in ldns before 1.6.11 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a Resource Record (RR) with an unknown type containing input that is longer than a specified length.
Vulnerability category: OverflowExecute codeDenial of service
Exploit prediction scoring system (EPSS) score for CVE-2011-3581
Probability of exploitation activity in the next 30 days: 10.13%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 94 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2011-3581
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
6.8
|
MEDIUM | AV:N/AC:M/Au:N/C:P/I:P/A:P |
8.6
|
6.4
|
NIST |
CWE ids for CVE-2011-3581
-
The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.Assigned by: nvd@nist.gov (Primary)
References for CVE-2011-3581
-
http://www.nlnetlabs.nl/bugs-script/show_bug.cgi?id=403
Bug 403 – heap overflow in ldns_rr_new_frm_str_internal
-
http://seclists.org/oss-sec/2011/q3/503
oss-sec: CVE request: heap-based buffer overflow in ldns
-
http://lists.opensuse.org/opensuse-security-announce/2011-10/msg00008.html
[security-announce] openSUSE-SU-2011:1161-1: important: ldns (CVE-2011-3
-
http://lists.fedoraproject.org/pipermail/package-announce/2011-October/068091.html
[SECURITY] Fedora 16 Update: ldns-1.6.11-2.fc16
-
http://lists.fedoraproject.org/pipermail/package-announce/2011-October/068239.html
[SECURITY] Fedora 15 Update: ldns-1.6.11-2.fc15
-
http://nlnetlabs.nl/svn/ldns/tags/release-1.6.11/Changelog
-
http://lists.fedoraproject.org/pipermail/package-announce/2011-October/068201.html
[SECURITY] Fedora 14 Update: ldns-1.6.11-2.fc14
-
http://www.securityfocus.com/bid/49748
ldns 'rr.c' Remote Heap Buffer Overflow Vulnerability
-
http://seclists.org/oss-sec/2011/q3/542
oss-sec: Re: CVE request: heap-based buffer overflow in ldns
Products affected by CVE-2011-3581
- cpe:2.3:a:nlnetlabs:ldns:*:*:*:*:*:*:*:*
- cpe:2.3:a:nlnetlabs:ldns:1.4.1:*:*:*:*:*:*:*
- cpe:2.3:a:nlnetlabs:ldns:1.4.0:*:*:*:*:*:*:*
- cpe:2.3:a:nlnetlabs:ldns:1.6.5:*:*:*:*:*:*:*
- cpe:2.3:a:nlnetlabs:ldns:1.6.4:*:*:*:*:*:*:*
- cpe:2.3:a:nlnetlabs:ldns:0.70:*:*:*:*:*:*:*
- cpe:2.3:a:nlnetlabs:ldns:1.6.9:*:*:*:*:*:*:*
- cpe:2.3:a:nlnetlabs:ldns:1.6.8:*:*:*:*:*:*:*
- cpe:2.3:a:nlnetlabs:ldns:1.6.1:*:*:*:*:*:*:*
- cpe:2.3:a:nlnetlabs:ldns:1.6.0:*:*:*:*:*:*:*
- cpe:2.3:a:nlnetlabs:ldns:1.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:nlnetlabs:ldns:1.2.0:*:*:*:*:*:*:*
- cpe:2.3:a:nlnetlabs:ldns:1.6.7:*:*:*:*:*:*:*
- cpe:2.3:a:nlnetlabs:ldns:1.6.6:*:*:*:*:*:*:*
- cpe:2.3:a:nlnetlabs:ldns:1.5.1:*:*:*:*:*:*:*
- cpe:2.3:a:nlnetlabs:ldns:1.5.0:*:*:*:*:*:*:*
- cpe:2.3:a:nlnetlabs:ldns:1.1.0:*:*:*:*:*:*:*
- cpe:2.3:a:nlnetlabs:ldns:1.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:nlnetlabs:ldns:0.66:*:*:*:*:*:*:*
- cpe:2.3:a:nlnetlabs:ldns:1.6.3:*:*:*:*:*:*:*
- cpe:2.3:a:nlnetlabs:ldns:1.6.2:*:*:*:*:*:*:*
- cpe:2.3:a:nlnetlabs:ldns:1.3:*:*:*:*:*:*:*
- cpe:2.3:a:nlnetlabs:ldns:1.2.2:*:*:*:*:*:*:*
- cpe:2.3:a:nlnetlabs:ldns:0.65:*:*:*:*:*:*:*
- cpe:2.3:a:nlnetlabs:ldns:0.60:*:*:*:*:*:*:*
- cpe:2.3:a:nlnetlabs:ldns:0.50:*:*:*:*:*:*:*