CVE-2017-9430

Priority
Description
Stack-based buffer overflow in dnstracer through 1.9 allows attackers to
cause a denial of service (application crash) or possibly have unspecified
other impact via a command line with a long name argument that is
mishandled in a strcpy call for argv[0]. An example threat model is a web
application that launches dnstracer with an untrusted name string.
Notes
Package
Upstream:needs-triage
Ubuntu 12.04 ESM (Precise Pangolin):needs-triage
Ubuntu 14.04 ESM (Trusty Tahr):needs-triage
Ubuntu 16.04 LTS (Xenial Xerus):needs-triage
Ubuntu 18.04 LTS (Bionic Beaver):needs-triage
Ubuntu 19.04 (Disco Dingo):ignored (reached end-of-life)
Ubuntu 19.10 (Eoan Ermine):needs-triage
Ubuntu 20.04 (Focal Fossa):needs-triage
More Information

Updated: 2020-01-23 20:34:51 UTC (commit b4629892d998f2ede31f59bb7508dc50a92ac664)