漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
漏洞
N/A
漏洞信息
Stack-based buffer overflow in the split_redraw function in split.c in mtr before 0.73, when invoked with the -p (aka --split) option, allows remote attackers to execute arbitrary code via a crafted DNS PTR record. NOTE: it could be argued that this is a vulnerability in the ns_name_ntop function in resolv/ns_name.c in glibc and the proper fix should be in glibc; if so, then this should not be treated as a vulnerability in mtr.
漏洞信息
N/A
漏洞
N/A
漏洞
mtr split.c文件远程栈溢出漏洞
漏洞信息
mtr是结合了traceroute和ping程序的网络诊断工具。 mtr的split.c文件的split_redraw()函数在处理特制的主机名时存在栈溢出漏洞,远程攻击者可能利用此漏洞控制用户系统。 以下是有漏洞部分的代码段: "split.c" #define MAX_LINE_SIZE 256 void split_redraw(void) { int max; ;int at; ip_t *addr; *name; newLine[MAX_LINE_SIZE]; i; ... for(at = 0
漏洞信息
N/A
漏洞
N/A