Computer Security
[EN] securityvulns.ru no-pyccku


FreeBSD rtsold buffer overflow
Published:27.10.2014
Source:
SecurityVulns ID:14059
Type:client
Threat Level:
6/10
Description:Buffer overflow on DNS response parsing.
Affected:FREEBSD : FreeBSD 9.3
 FREEBSD : FreeBSD 10.1
CVE:CVE-2014-3954 (Stack-based buffer overflow in rtsold in FreeBSD 9.1 through 10.1-RC2 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via crafted DNS parameters in a router advertisement message.)
Original documentdocumentFREEBSD, FreeBSD Security Advisory FreeBSD-SA-14:20.rtsold (27.10.2014)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod