Debian Ldns vulnerabilities
7 known vulnerabilities affecting debian/ldns.
Total CVEs
7
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
CRITICAL2HIGH1MEDIUM3LOW1
Vulnerabilities
Page 1 of 1
CVE-2020-19861HIGHCVSS 7.5fixed in ldns 1.8.1-1 (bookworm)2020
CVE-2020-19861 [HIGH] CVE-2020-19861: ldns - When a zone file in ldns 1.7.1 is parsed, the function ldns_nsec3_salt_data is t...
When a zone file in ldns 1.7.1 is parsed, the function ldns_nsec3_salt_data is too trusted for the length value obtained from the zone file. When the memcpy is copied, the 0xfe - ldns_rdf_size(salt_rdf) byte data can be copied, causing heap overflow information leakage.
Scope: local
bookworm: resolved (fixed in 1.8.1-1)
bullseye: open
forky: resolved (fixed in 1.8.1-1)
debian
CVE-2020-19860MEDIUMCVSS 6.5fixed in ldns 1.8.1-1 (bookworm)2020
CVE-2020-19860 [MEDIUM] CVE-2020-19860: ldns - When ldns version 1.7.1 verifies a zone file, the ldns_rr_new_frm_str_internal f...
When ldns version 1.7.1 verifies a zone file, the ldns_rr_new_frm_str_internal function has a heap out of bounds read vulnerability. An attacker can leak information on the heap by constructing a zone file payload.
Scope: local
bookworm: resolved (fixed in 1.8.1-1)
bullseye: open
forky: resolved (fixed in 1.8.1-1)
sid: resolved (fixed in 1.8.1-1)
trixie: resolved (fi
debian
CVE-2017-1000232CRITICALCVSS 9.8fixed in ldns 1.7.0-4 (bookworm)2017
CVE-2017-1000232 [CRITICAL] CVE-2017-1000232: ldns - A double-free vulnerability in str2host.c in ldns 1.7.0 have unspecified impact ...
A double-free vulnerability in str2host.c in ldns 1.7.0 have unspecified impact and attack vectors.
Scope: local
bookworm: resolved (fixed in 1.7.0-4)
bullseye: resolved (fixed in 1.7.0-4)
forky: resolved (fixed in 1.7.0-4)
sid: resolved (fixed in 1.7.0-4)
trixie: resolved (fixed in 1.7.0-4)
debian
CVE-2017-1000231CRITICALCVSS 9.8fixed in ldns 1.7.0-4 (bookworm)2017
CVE-2017-1000231 [CRITICAL] CVE-2017-1000231: ldns - A double-free vulnerability in parse.c in ldns 1.7.0 have unspecified impact and...
A double-free vulnerability in parse.c in ldns 1.7.0 have unspecified impact and attack vectors.
Scope: local
bookworm: resolved (fixed in 1.7.0-4)
bullseye: resolved (fixed in 1.7.0-4)
forky: resolved (fixed in 1.7.0-4)
sid: resolved (fixed in 1.7.0-4)
trixie: resolved (fixed in 1.7.0-4)
debian
CVE-2014-3209LOWCVSS 2.1fixed in ldns 1.6.17-4 (bookworm)2014
CVE-2014-3209 [LOW] CVE-2014-3209: ldns - The ldns-keygen tool in ldns 1.6.x uses the current umask to set the privileges ...
The ldns-keygen tool in ldns 1.6.x uses the current umask to set the privileges of the private key, which might allow local users to obtain the private key by reading the file.
Scope: local
bookworm: resolved (fixed in 1.6.17-4)
bullseye: resolved (fixed in 1.6.17-4)
forky: resolved (fixed in 1.6.17-4)
sid: resolved (fixed in 1.6.17-4)
trixie: resolved (fixed in 1.6.17-4)
debian
CVE-2011-3581MEDIUMCVSS 6.8fixed in ldns 1.6.11-1 (bookworm)2011
CVE-2011-3581 [MEDIUM] CVE-2011-3581: ldns - Heap-based buffer overflow in the ldns_rr_new_frm_str_internal function in ldns ...
Heap-based buffer overflow in the ldns_rr_new_frm_str_internal function in ldns before 1.6.11 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a Resource Record (RR) with an unknown type containing input that is longer than a specified length.
Scope: local
bookworm: resolved (fixed in 1.6.11-1)
bullseye: resolved (fix
debian
CVE-2009-1086MEDIUMCVSS 6.4fixed in ldns 1.5.1-1 (bookworm)2009
CVE-2009-1086 [MEDIUM] CVE-2009-1086: ldns - Heap-based buffer overflow in the ldns_rr_new_frm_str_internal function in ldns ...
Heap-based buffer overflow in the ldns_rr_new_frm_str_internal function in ldns 1.4.x allows remote attackers to cause a denial of service (memory corruption) and possibly execute arbitrary code via a DNS resource record (RR) with a long (1) class field (clas variable) and possibly (2) TTL field.
Scope: local
bookworm: resolved (fixed in 1.5.1-1)
bullseye: resolved (fi
debian