Upstream information

CVE-2011-3581 at MITRE

Description

Heap-based buffer overflow in the ldns_rr_new_frm_str_internal function in ldns before 1.6.11 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a Resource Record (RR) with an unknown type containing input that is longer than a specified length.

SUSE information

Overall state of this security issue: Resolved

This issue is currently rated as having moderate severity.

CVSS v2 Scores
  National Vulnerability Database
Base Score 6.8
Vector AV:N/AC:M/Au:N/C:P/I:P/A:P
Access Vector Network
Access Complexity Medium
Authentication None
Confidentiality Impact Partial
Integrity Impact Partial
Availability Impact Partial
SUSE Bugzilla entry: 720277 [RESOLVED / FIXED]

SUSE Security Advisories:

List of released packages

Product(s) Fixed package version(s) References
SUSE Linux Enterprise Module for Basesystem 15
  • ldns-devel >= 1.7.0-2.22
  • libldns2 >= 1.7.0-2.22
Patchnames:
SUSE Linux Enterprise Module for Basesystem 15 GA ldns-devel
SUSE Linux Enterprise Module for Development Tools 15
  • perl-DNS-LDNS >= 1.7.0-2.22
Patchnames:
SUSE Linux Enterprise Module for Development Tools 15 GA perl-DNS-LDNS
openSUSE 11.3
  • ldns-debugsource >= 1.5.1-7.3.1
  • libldns1-debuginfo >= 1.5.1-7.3.1
openSUSE 11.3
  • libldns-devel >= 1.5.1-7.3.1
  • libldns1 >= 1.5.1-7.3.1
openSUSE 11.4
  • libldns-devel >= 1.5.1-10.11.1
  • libldns-devel >= 1.5.1-2.1
  • libldns1 >= 1.5.1-10.11.1
  • libldns1 >= 1.5.1-2.1
openSUSE 11.4
  • ldns-debugsource >= 1.5.1-10.11.1
  • libldns-devel >= 1.5.1-10.11.1
  • libldns1 >= 1.5.1-10.11.1
  • libldns1-debuginfo >= 1.5.1-10.11.1
Patchnames:
ldns
openSUSE Tumbleweed
  • ldns >= 1.6.17-5.7
  • ldns-devel >= 1.6.17-5.7
  • libldns1 >= 1.6.17-5.7
  • perl-DNS-LDNS >= 1.6.17-5.7
  • python-ldns >= 1.6.17-5.7
Patchnames:
openSUSE Tumbleweed GA ldns