An exploitable denial-of-service vulnerability exists in the resource record-parsing functionality of Videolabs libmicrodns 0.1.0. When parsing compressed labels in mDNS messages, the compression pointer is followed without checking for recursion, leading to a denial of service. An attacker can send an mDNS message to trigger this vulnerability.
The product does not properly control the amount of recursion that takes place, consuming excessive resources, such as allocated memory or the program stack.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Libmicrodns | Videolabs | 0.1.0 (including) | 0.1.0 (including) |
Libmicrodns | Ubuntu | bionic | * |
Libmicrodns | Ubuntu | eoan | * |
Libmicrodns | Ubuntu | trusty | * |
Libmicrodns | Ubuntu | upstream | * |
Vlc | Ubuntu | bionic | * |
Vlc | Ubuntu | groovy | * |
Vlc | Ubuntu | hirsute | * |
Vlc | Ubuntu | impish | * |
Vlc | Ubuntu | kinetic | * |
Vlc | Ubuntu | lunar | * |
Vlc | Ubuntu | mantic | * |
Vlc | Ubuntu | trusty | * |
Vlc | Ubuntu | xenial | * |