Show filters
5 Total Results
Displaying 1-5 of 5
Sort by:
Attacker Value
Unknown

CVE-2020-28928

Disclosure Date: November 24, 2020 (last updated February 22, 2025)
In musl libc through 1.2.1, wcsnrtombs mishandles particular combinations of destination buffer size and source character limit, as demonstrated by an invalid write access (buffer overflow).
Attacker Value
Unknown

CVE-2014-3484

Disclosure Date: February 20, 2020 (last updated February 21, 2025)
Multiple stack-based buffer overflows in the __dn_expand function in network/dn_expand.c in musl libc 1.1x before 1.1.2 and 0.9.13 through 1.0.3 allow remote attackers to (1) have unspecified impact via an invalid name length in a DNS response or (2) cause a denial of service (crash) via an invalid name length in a DNS response, related to an infinite loop with no output.
Attacker Value
Unknown

CVE-2019-14697

Disclosure Date: August 06, 2019 (last updated November 27, 2024)
musl libc through 1.1.23 has an x87 floating-point stack adjustment imbalance, related to the math/i386/ directory. In some cases, use of this library could introduce out-of-bounds writes that are not present in an application's source code.
Attacker Value
Unknown

CVE-2017-15650

Disclosure Date: October 19, 2017 (last updated November 26, 2024)
musl libc before 1.1.17 has a buffer overflow via crafted DNS replies because dns_parse_callback in network/lookup_name.c does not restrict the number of addresses, and thus an attacker can provide an unexpected number by sending A records in a reply to an AAAA query.
0
Attacker Value
Unknown

CVE-2015-1817

Disclosure Date: August 18, 2017 (last updated November 26, 2024)
Stack-based buffer overflow in the inet_pton function in network/inet_pton.c in musl libc 0.9.15 through 1.0.4, and 1.1.0 through 1.1.7 allows attackers to have unspecified impact via unknown vectors.
0