CVE-2014-3554

Buffer overflow in the ndp_msg_opt_dnssl_domain function in libndp allows remote routers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted DNS Search List (DNSSL) in an IPv6 router advertisement.
References
Link Resource
http://www.openwall.com/lists/oss-security/2014/07/29/2 Mailing List Patch Third Party Advisory
http://www.securityfocus.com/bid/68945 Third Party Advisory VDB Entry
https://bugzilla.redhat.com/show_bug.cgi?id=1118583 Issue Tracking Patch Third Party Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/94927 Third Party Advisory VDB Entry
http://www.openwall.com/lists/oss-security/2014/07/29/2 Mailing List Patch Third Party Advisory
http://www.securityfocus.com/bid/68945 Third Party Advisory VDB Entry
https://bugzilla.redhat.com/show_bug.cgi?id=1118583 Issue Tracking Patch Third Party Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/94927 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

cpe:2.3:a:libndp:libndp:*:*:*:*:*:*:*:*

History

21 Nov 2024, 02:08

Type Values Removed Values Added
References () http://www.openwall.com/lists/oss-security/2014/07/29/2 - Mailing List, Patch, Third Party Advisory () http://www.openwall.com/lists/oss-security/2014/07/29/2 - Mailing List, Patch, Third Party Advisory
References () http://www.securityfocus.com/bid/68945 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/68945 - Third Party Advisory, VDB Entry
References () https://bugzilla.redhat.com/show_bug.cgi?id=1118583 - Issue Tracking, Patch, Third Party Advisory () https://bugzilla.redhat.com/show_bug.cgi?id=1118583 - Issue Tracking, Patch, Third Party Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/94927 - Third Party Advisory, VDB Entry () https://exchange.xforce.ibmcloud.com/vulnerabilities/94927 - Third Party Advisory, VDB Entry

12 Oct 2021, 14:28

Type Values Removed Values Added
CWE CWE-119 CWE-120
CPE cpe:2.3:a:libndp:libndp:-:*:*:*:*:*:*:* cpe:2.3:a:libndp:libndp:*:*:*:*:*:*:*:*
References (BID) http://www.securityfocus.com/bid/68945 - (BID) http://www.securityfocus.com/bid/68945 - Third Party Advisory, VDB Entry
References (XF) https://exchange.xforce.ibmcloud.com/vulnerabilities/94927 - (XF) https://exchange.xforce.ibmcloud.com/vulnerabilities/94927 - Third Party Advisory, VDB Entry
References (MLIST) http://www.openwall.com/lists/oss-security/2014/07/29/2 - (MLIST) http://www.openwall.com/lists/oss-security/2014/07/29/2 - Mailing List, Patch, Third Party Advisory
References (CONFIRM) https://bugzilla.redhat.com/show_bug.cgi?id=1118583 - (CONFIRM) https://bugzilla.redhat.com/show_bug.cgi?id=1118583 - Issue Tracking, Patch, Third Party Advisory

Information

Published : 2014-07-31 14:55

Updated : 2024-11-21 02:08


NVD link : CVE-2014-3554

Mitre link : CVE-2014-3554

CVE.ORG link : CVE-2014-3554


JSON object : View

Products Affected

libndp

  • libndp
CWE
CWE-120

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')