dns2tcp before 0.4.1 does not properly handle negative values in a certain length field in the input argument to the (1) dns_simple_decode or (2) dns_decode function, which allows remote attackers to overwrite a buffer and have unspecified other impact.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Dns2tcp | Hsc | * | 0.4 (including) |
Dns2tcp | Ubuntu | hardy | * |
Dns2tcp | Ubuntu | upstream | * |