musl libc before 1.1.17 has a buffer overflow via crafted...
High severity
Unreviewed
Published
May 17, 2022
to the GitHub Advisory Database
•
Updated Feb 3, 2023
Description
Published by the National Vulnerability Database
Oct 19, 2017
Published to the GitHub Advisory Database
May 17, 2022
Last updated
Feb 3, 2023
musl libc before 1.1.17 has a buffer overflow via crafted DNS replies because dns_parse_callback in network/lookup_name.c does not restrict the number of addresses, and thus an attacker can provide an unexpected number by sending A records in a reply to an AAAA query.
References