Vulnerabilities
Vulnerable Software
Musl-Libc:  >> Musl  >> 1.1.1  Security Vulnerabilities
In musl libc through 1.2.1, wcsnrtombs mishandles particular combinations of destination buffer size and source character limit, as demonstrated by an invalid write access (buffer overflow).
CVSS Score
5.5
EPSS Score
0.0
Published
2020-11-24
Multiple stack-based buffer overflows in the __dn_expand function in network/dn_expand.c in musl libc 1.1x before 1.1.2 and 0.9.13 through 1.0.3 allow remote attackers to (1) have unspecified impact via an invalid name length in a DNS response or (2) cause a denial of service (crash) via an invalid name length in a DNS response, related to an infinite loop with no output.
CVSS Score
9.8
EPSS Score
0.018
Published
2020-02-20
musl libc before 1.1.17 has a buffer overflow via crafted DNS replies because dns_parse_callback in network/lookup_name.c does not restrict the number of addresses, and thus an attacker can provide an unexpected number by sending A records in a reply to an AAAA query.
CVSS Score
7.5
EPSS Score
0.006
Published
2017-10-19
Stack-based buffer overflow in the inet_pton function in network/inet_pton.c in musl libc 0.9.15 through 1.0.4, and 1.1.0 through 1.1.7 allows attackers to have unspecified impact via unknown vectors.
CVSS Score
9.8
EPSS Score
0.005
Published
2017-08-18


Contact Us

Shodan ® - All rights reserved