Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
N/A
Vulnerability Description
The BIND 4 and BIND 8.2.x stub resolver libraries, and other libraries such as glibc 2.2.5 and earlier, libc, and libresolv, use the maximum buffer size instead of the actual size when processing a DNS response, which causes the stub resolvers to read past the actual boundary ("read buffer overflow"), allowing remote attackers to cause a denial of service (crash).
CVSS Information
N/A
Vulnerability Type
N/A
Vulnerability Title
多个供应商libc DNS分解器信息泄露漏洞
Vulnerability Description
The BIND 4版本和BIND 8.2.x版本的存根分解器函数库,以及例如glibc 2.2.5版本和之前版本、libc和libresolv的其他函数库在处理DNS回复时使用最大值缓冲区容量而不是实际容量,导致存根分解器越过实际边界读取("read buffer overflow"),远程攻击者可以导致服务拒绝(崩溃)。
CVSS Information
N/A
Vulnerability Type
N/A