Vulnerabilities
Vulnerable Software

Vulnerability Details CVE-2019-13952

The set_ipv6() function in zscan_rfc1035.rl in gdnsd before 2.4.3 and 3.x before 3.2.1 has a stack-based buffer overflow via a long and malformed IPv6 address in zone data.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.004
EPSS Ranking 60.1%
CVSS Severity
CVSS v3 Score 9.8
CVSS v2 Score 7.5
Products affected by CVE-2019-13952
  • Gdnsd » Gdnsd » Version: 1.10.0
    cpe:2.3:a:gdnsd:gdnsd:1.10.0
  • Gdnsd » Gdnsd » Version: 1.10.1
    cpe:2.3:a:gdnsd:gdnsd:1.10.1
  • Gdnsd » Gdnsd » Version: 1.11.0
    cpe:2.3:a:gdnsd:gdnsd:1.11.0
  • Gdnsd » Gdnsd » Version: 1.11.1
    cpe:2.3:a:gdnsd:gdnsd:1.11.1
  • Gdnsd » Gdnsd » Version: 1.11.2
    cpe:2.3:a:gdnsd:gdnsd:1.11.2
  • Gdnsd » Gdnsd » Version: 1.11.3
    cpe:2.3:a:gdnsd:gdnsd:1.11.3
  • Gdnsd » Gdnsd » Version: 1.11.4
    cpe:2.3:a:gdnsd:gdnsd:1.11.4
  • Gdnsd » Gdnsd » Version: 1.11.5
    cpe:2.3:a:gdnsd:gdnsd:1.11.5
  • Gdnsd » Gdnsd » Version: 1.6.0
    cpe:2.3:a:gdnsd:gdnsd:1.6.0
  • Gdnsd » Gdnsd » Version: 1.6.1
    cpe:2.3:a:gdnsd:gdnsd:1.6.1
  • Gdnsd » Gdnsd » Version: 1.6.2
    cpe:2.3:a:gdnsd:gdnsd:1.6.2
  • Gdnsd » Gdnsd » Version: 1.6.3
    cpe:2.3:a:gdnsd:gdnsd:1.6.3
  • Gdnsd » Gdnsd » Version: 1.6.4
    cpe:2.3:a:gdnsd:gdnsd:1.6.4
  • Gdnsd » Gdnsd » Version: 1.6.5
    cpe:2.3:a:gdnsd:gdnsd:1.6.5
  • Gdnsd » Gdnsd » Version: 1.6.6
    cpe:2.3:a:gdnsd:gdnsd:1.6.6
  • Gdnsd » Gdnsd » Version: 1.6.7
    cpe:2.3:a:gdnsd:gdnsd:1.6.7
  • Gdnsd » Gdnsd » Version: 1.6.8
    cpe:2.3:a:gdnsd:gdnsd:1.6.8
  • Gdnsd » Gdnsd » Version: 1.6.9
    cpe:2.3:a:gdnsd:gdnsd:1.6.9
  • Gdnsd » Gdnsd » Version: 1.7.1
    cpe:2.3:a:gdnsd:gdnsd:1.7.1
  • Gdnsd » Gdnsd » Version: 1.7.2
    cpe:2.3:a:gdnsd:gdnsd:1.7.2
  • Gdnsd » Gdnsd » Version: 1.7.3
    cpe:2.3:a:gdnsd:gdnsd:1.7.3
  • Gdnsd » Gdnsd » Version: 1.7.4
    cpe:2.3:a:gdnsd:gdnsd:1.7.4
  • Gdnsd » Gdnsd » Version: 1.7.5
    cpe:2.3:a:gdnsd:gdnsd:1.7.5
  • Gdnsd » Gdnsd » Version: 1.7.6
    cpe:2.3:a:gdnsd:gdnsd:1.7.6
  • Gdnsd » Gdnsd » Version: 1.7.7
    cpe:2.3:a:gdnsd:gdnsd:1.7.7
  • Gdnsd » Gdnsd » Version: 1.7.8
    cpe:2.3:a:gdnsd:gdnsd:1.7.8
  • Gdnsd » Gdnsd » Version: 1.8.0
    cpe:2.3:a:gdnsd:gdnsd:1.8.0
  • Gdnsd » Gdnsd » Version: 1.8.1
    cpe:2.3:a:gdnsd:gdnsd:1.8.1
  • Gdnsd » Gdnsd » Version: 1.8.2
    cpe:2.3:a:gdnsd:gdnsd:1.8.2
  • Gdnsd » Gdnsd » Version: 1.8.3
    cpe:2.3:a:gdnsd:gdnsd:1.8.3
  • Gdnsd » Gdnsd » Version: 1.9.0
    cpe:2.3:a:gdnsd:gdnsd:1.9.0
  • Gdnsd » Gdnsd » Version: 2.0.0
    cpe:2.3:a:gdnsd:gdnsd:2.0.0
  • Gdnsd » Gdnsd » Version: 2.1.0
    cpe:2.3:a:gdnsd:gdnsd:2.1.0
  • Gdnsd » Gdnsd » Version: 2.1.1
    cpe:2.3:a:gdnsd:gdnsd:2.1.1
  • Gdnsd » Gdnsd » Version: 2.1.2
    cpe:2.3:a:gdnsd:gdnsd:2.1.2
  • Gdnsd » Gdnsd » Version: 2.1.3
    cpe:2.3:a:gdnsd:gdnsd:2.1.3
  • Gdnsd » Gdnsd » Version: 2.2.0
    cpe:2.3:a:gdnsd:gdnsd:2.2.0
  • Gdnsd » Gdnsd » Version: 2.2.1
    cpe:2.3:a:gdnsd:gdnsd:2.2.1
  • Gdnsd » Gdnsd » Version: 2.2.2
    cpe:2.3:a:gdnsd:gdnsd:2.2.2
  • Gdnsd » Gdnsd » Version: 2.2.3
    cpe:2.3:a:gdnsd:gdnsd:2.2.3
  • Gdnsd » Gdnsd » Version: 2.2.4
    cpe:2.3:a:gdnsd:gdnsd:2.2.4
  • Gdnsd » Gdnsd » Version: 2.2.5
    cpe:2.3:a:gdnsd:gdnsd:2.2.5
  • Gdnsd » Gdnsd » Version: 2.3.0
    cpe:2.3:a:gdnsd:gdnsd:2.3.0
  • Gdnsd » Gdnsd » Version: 2.3.1
    cpe:2.3:a:gdnsd:gdnsd:2.3.1
  • Gdnsd » Gdnsd » Version: 2.4.0
    cpe:2.3:a:gdnsd:gdnsd:2.4.0
  • Gdnsd » Gdnsd » Version: 2.4.1
    cpe:2.3:a:gdnsd:gdnsd:2.4.1
  • Gdnsd » Gdnsd » Version: 2.4.2
    cpe:2.3:a:gdnsd:gdnsd:2.4.2
  • Gdnsd » Gdnsd » Version: 3.0.0
    cpe:2.3:a:gdnsd:gdnsd:3.0.0
  • Gdnsd » Gdnsd » Version: 3.0.1
    cpe:2.3:a:gdnsd:gdnsd:3.0.1
  • Gdnsd » Gdnsd » Version: 3.1.0
    cpe:2.3:a:gdnsd:gdnsd:3.1.0
  • Gdnsd » Gdnsd » Version: 3.2.0
    cpe:2.3:a:gdnsd:gdnsd:3.2.0


Contact Us

Shodan ® - All rights reserved