Shodan
Maps
Images
Monitor
Developer
More...
Dashboard
View Api Docs
Vulnerabilities
By Date
Known Exploited
Advanced Search
Vulnerable Software
Vendors
Products
Vulnerability Details CVE-2023-32726
The vulnerability is caused by improper check for check if RDLENGTH does not overflow the buffer in response from DNS server.
Exploit prediction scoring system (EPSS) score
EPSS Score
0.001
EPSS Ranking
26.9%
CVSS Severity
CVSS v3 Score
3.9
References
https://lists.debian.org/debian-lts-announce/2024/01/msg00012.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BYSYLA7VTHR25CBLYO5ZLEJFGU7HTHQB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UMFKNV5E4LG2DIZNPRWQ2ENH75H6UEQT/
https://support.zabbix.com/browse/ZBX-23855
https://lists.debian.org/debian-lts-announce/2024/01/msg00012.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BYSYLA7VTHR25CBLYO5ZLEJFGU7HTHQB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UMFKNV5E4LG2DIZNPRWQ2ENH75H6UEQT/
https://support.zabbix.com/browse/ZBX-23855
Products affected by CVE-2023-32726
Zabbix
»
Zabbix-Agent
»
Version:
5.0.0
cpe:2.3:a:zabbix:zabbix-agent:5.0.0
Zabbix
»
Zabbix-Agent
»
Version:
5.0.39
cpe:2.3:a:zabbix:zabbix-agent:5.0.39
Zabbix
»
Zabbix-Agent
»
Version:
6.0.0
cpe:2.3:a:zabbix:zabbix-agent:6.0.0
Zabbix
»
Zabbix-Agent
»
Version:
6.0.23
cpe:2.3:a:zabbix:zabbix-agent:6.0.23
Zabbix
»
Zabbix-Agent
»
Version:
6.4.0
cpe:2.3:a:zabbix:zabbix-agent:6.4.0
Zabbix
»
Zabbix-Agent
»
Version:
6.4.8
cpe:2.3:a:zabbix:zabbix-agent:6.4.8
Zabbix
»
Zabbix-Agent
»
Version:
7.0.0
cpe:2.3:a:zabbix:zabbix-agent:7.0.0
Products
Monitor
Search Engine
Developer API
Maps
Bulk Data
Images
Snippets
Pricing
Membership
API Subscriptions
Enterprise
Contact Us
support@shodan.io
Shodan ® - All rights reserved