emdns_resolve_raw in emdns.c in emdns through fbd1eef calls strlen with an input that may not be '\0' terminated, leading to a stack-based buffer over-read. This can be triggered by a remote adversary that can send DNS requests to the emdns server. The impact could vary depending on the system libraries, compiler, and processor architecture. Code before be565c3 is unaffected.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://papers.mathyvanhoef.com/esorics2024.pdf |
![]() ![]() ![]() |
History
No history.

Status: PUBLISHED
Assigner: mitre
Published: 2024-04-29T00:00:00
Updated: 2024-08-02T22:16:46.661Z
Reserved: 2023-12-09T00:00:00
Link: CVE-2023-50434

Updated: 2024-08-02T22:16:46.661Z

Status : Awaiting Analysis
Published: 2024-04-29T22:15:06.883
Modified: 2024-11-21T08:36:59.020
Link: CVE-2023-50434

No data.