DescriptionMultiple buffer overflows in mDNSResponder before 625.41.2 allow remote attackers to read or write to out-of-bounds memory locations via vectors involving the (1) GetValueForIPv4Addr, (2) GetValueForMACAddr, (3) rfc3110_import, or (4) CopyNSEC3ResourceRecord function.
Overall state of this security issue: Does not affect SUSE products
This issue is currently rated as having moderate severity.
|National Vulnerability Database|
Note from the SUSE Security TeamThe package mDNSResponder-lib in the SUSE Linux Enterprise 11 family of SUSE Enterprise products derives code from mDNSResponder, but does not contain vulnerable code and is not affected by the buffer overflows CVE-2015-7987 / VU#1543335. SUSE Bugzilla entry: 951787 [RESOLVED / INVALID] No SUSE Security Announcements cross referenced.
Status of this issue by product and package
Please note that this evaluation state might be work in progress, incomplete or outdated. Also information for service packs in the LTSS phase is only included for issues meeting the LTSS criteria. If in doubt, feel free to contact us for clarification.
|SUSE Linux Enterprise Server 10 SP4 LTSS||mDNSResponder-lib||Not affected|