dkim-milter 2.6.0 through 2.8.0 allows remote attackers to cause a denial of service (crash) by signing a message with a key that has been revoked in DNS, which triggers an assertion error.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 01:00
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/33581 - Vendor Advisory | |
References | () http://secunia.com/advisories/34053 - Vendor Advisory | |
References | () http://sourceforge.net/project/shownotes.php?release_id=654247 - Patch | |
References | () http://sourceforge.net/tracker/index.php?func=detail&aid=2508602&group_id=139420&atid=744358 - Exploit | |
References | () http://www.debian.org/security/2009/dsa-1728 - Patch | |
References | () http://www.openwall.com/lists/oss-security/2009/03/01/1 - | |
References | () http://www.securityfocus.com/bid/33337 - Patch | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/48085 - |
Information
Published : 2009-03-06 06:50
Updated : 2024-11-21 01:00
NVD link : CVE-2009-0770
Mitre link : CVE-2009-0770
CVE.ORG link : CVE-2009-0770
JSON object : View
Products Affected
dkim
- dkim-milter
CWE