Bug 1042808 (CVE-2017-9430)

Summary: VUL-0: CVE-2017-9430: dnstracer: Stack-based buffer overflow could cause denial of service
Product: [Novell Products] SUSE Security Incidents Reporter: Victor Pereira <vpereira>
Component: IncidentsAssignee: Martin Hauke <mardnh>
Status: NEW --- QA Contact: Security Team bot <security-team>
Severity: Normal    
Priority: P3 - Medium CC: leo, mardnh, smash_bz
Version: unspecified   
Target Milestone: ---   
Hardware: Other   
OS: openSUSE 42.2   
URL: https://smash.suse.de/issue/186248/
Found By: Security Response Team Services Priority:
Business Priority: Blocker: ---
Marketing QA Status: --- IT Deployment: ---

Description Victor Pereira 2017-06-06 06:17:50 UTC

Stack-based buffer overflow in dnstracer through 1.9 allows attackers to cause a
denial of service (application crash) or possibly have unspecified other impact
via a command line with a long name argument that is mishandled in a strcpy call
for argv[0]. An example threat model is a web application that launches
dnstracer with an untrusted name string.

Comment 1 Johannes Segitz 2017-08-07 10:34:47 UTC
we have no maintainer for this, would you be willing to submit for this?