Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2008-2469Improper Restriction of Operations within the Bounds of a Memory Buffer in Libspf2

Severity
10.0CRITICALNVD
EPSS
39.0%
top 2.72%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedOct 23
Latest updateMay 1

Description

Heap-based buffer overflow in the SPF_dns_resolv_lookup function in Spf_dns_resolv.c in libspf2 before 1.2.8 allows remote attackers to execute arbitrary code via a long DNS TXT record with a modified length field.

CVSS vector

AV:N/AC:L/C:C/I:C/A:CExploitability: 10.0 | Impact: 10.0

Affected Packages3 packages

debiandebian/libspf2< libspf2 1.2.9-1 (bookworm)
Debianlibspf2/libspf2< 1.2.9-1+3
NVDlibspf/libspf21.2.7+8

Patches

🔴Vulnerability Details

2
GHSA
GHSA-jc7w-hj86-2rr5: Heap-based buffer overflow in the SPF_dns_resolv_lookup function in Spf_dns_resolv2022-05-01
OSV
CVE-2008-2469: Heap-based buffer overflow in the SPF_dns_resolv_lookup function in Spf_dns_resolv2008-10-23

💥Exploits & PoCs

1
Exploit-DB
LibSPF2 < 1.2.8 - DNS TXT Record Parsing Bug Heap Overflow (PoC)2008-10-22

📋Vendor Advisories

1
Debian
CVE-2008-2469: libspf2 - Heap-based buffer overflow in the SPF_dns_resolv_lookup function in Spf_dns_reso...2008
CVE-2008-2469 — Debian Libspf2 vulnerability | cvebase