-
Defect (Security)
-
Resolution: Fixed
-
Minor
-
None
-
None
-
None
Mitre ID | CVE-2023-32726 |
CVSS score | 3.9 |
CVSS Severity | Low |
CVSS vector | CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:L |
Summary | Possible buffer overread from reading DNS responses |
Description | The vulnerability is caused by improper check for RDLENGTH, if it overflows the buffer in response from DNS server. |
Common Weakness Enumeration (CWE) | CWE-754: Improper Check for Unusual or Exceptional Conditions |
Common Attack Pattern Enumeration and Classification (CAPEC) | CAPEC-540 Overread Buffers |
Known attack vectors | This type of attack may result in exposure of sensitive information, a system crash, or arbitrary code execution. |
Patch provided | No |
Component/s | Agent |
Affected version/s and fix version/s | 5.0.0 - 5.0.39 / 5.0.40 6.0.0 - 6.0.23 / 6.0.24 6.4.0 - 6.4.8 / 6.4.9 7.0.0alpha1 - 7.0.0alpha6 / 7.0.0alpha8 |
Fix compatibility tests | None |
Resolution | Fixed |
Workarounds | - |
Acknowledgements | This vulnerability is reported in HackerOne bounty hunter platform by Philippe Antoine (catenacyber) |