Multiple stack-based buffer overflows in the __dn_expand function in network/dn_expand.c in musl libc 1.1x before 1.1.2 and 0.9.13 through 1.0.3 allow remote attackers to (1) have unspecified impact via an invalid name length in a DNS response or (2) cause a denial of service (crash) via an invalid name length in a DNS response, related to an infinite loop with no output.
Software | From | Fixed in |
---|---|---|
musl-libc / musl | 0.9.13 | 1.0.3.x |
musl-libc / musl | 1.1.0 | 1.1.2 |