First published: Wed May 21 2008(Updated: )
Stack-based buffer overflow in the split_redraw function in split.c in mtr before 0.73, when invoked with the -p (aka --split) option, allows remote attackers to execute arbitrary code via a crafted DNS PTR record. NOTE: it could be argued that this is a vulnerability in the ns_name_ntop function in resolv/ns_name.c in glibc and the proper fix should be in glibc; if so, then this should not be treated as a vulnerability in mtr.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Matt Kimball and Roger Wolff MTR | =0.35 | |
Matt Kimball and Roger Wolff MTR | =0.25 | |
Matt Kimball and Roger Wolff MTR | =0.69 | |
Matt Kimball and Roger Wolff MTR | =0.37 | |
Matt Kimball and Roger Wolff MTR | =0.49 | |
Matt Kimball and Roger Wolff MTR | =0.59 | |
Matt Kimball and Roger Wolff MTR | =0.34 | |
Matt Kimball and Roger Wolff MTR | =0.60 | |
Matt Kimball and Roger Wolff MTR | =0.52 | |
Matt Kimball and Roger Wolff MTR | =0.58 | |
Matt Kimball and Roger Wolff MTR | =0.39 | |
Matt Kimball and Roger Wolff MTR | =0.42 | |
Matt Kimball and Roger Wolff MTR | =0.22 | |
Matt Kimball and Roger Wolff MTR | =0.70 | |
Matt Kimball and Roger Wolff MTR | =0.32 | |
Matt Kimball and Roger Wolff MTR | =0.24 | |
Matt Kimball and Roger Wolff MTR | =0.46 | |
Matt Kimball and Roger Wolff MTR | =0.71 | |
Matt Kimball and Roger Wolff MTR | =0.45 | |
Matt Kimball and Roger Wolff MTR | =0.65 | |
Matt Kimball and Roger Wolff MTR | =0.28 | |
Matt Kimball and Roger Wolff MTR | =0.31 | |
Matt Kimball and Roger Wolff MTR | =0.51 | |
Matt Kimball and Roger Wolff MTR | =0.38 | |
Matt Kimball and Roger Wolff MTR | =0.68 | |
Matt Kimball and Roger Wolff MTR | =0.66 | |
Matt Kimball and Roger Wolff MTR | =0.43 | |
Matt Kimball and Roger Wolff MTR | =0.29 | |
Matt Kimball and Roger Wolff MTR | =0.47 | |
Matt Kimball and Roger Wolff MTR | =0.55 | |
Matt Kimball and Roger Wolff MTR | =0.50 | |
Matt Kimball and Roger Wolff MTR | =0.57 | |
Matt Kimball and Roger Wolff MTR | =0.40 | |
Matt Kimball and Roger Wolff MTR | =0.23 | |
Matt Kimball and Roger Wolff MTR | =0.62 | |
Matt Kimball and Roger Wolff MTR | =0.61 | |
Matt Kimball and Roger Wolff MTR | =0.36 | |
Matt Kimball and Roger Wolff MTR | =0.63 | |
Matt Kimball and Roger Wolff MTR | =0.64 | |
Matt Kimball and Roger Wolff MTR | =0.21 | |
Matt Kimball and Roger Wolff MTR | =0.26 | |
Matt Kimball and Roger Wolff MTR | =0.44 | |
Matt Kimball and Roger Wolff MTR | =0.67 | |
Matt Kimball and Roger Wolff MTR | =0.53 | |
Matt Kimball and Roger Wolff MTR | <=0.72 | |
Matt Kimball and Roger Wolff MTR | =0.30 | |
Matt Kimball and Roger Wolff MTR | =0.33 | |
Matt Kimball and Roger Wolff MTR | =0.56 | |
Matt Kimball and Roger Wolff MTR | =0.27 | |
Matt Kimball and Roger Wolff MTR | =0.54 | |
Matt Kimball and Roger Wolff MTR | =0.48 | |
Matt Kimball and Roger Wolff MTR | =0.41 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-2357 is classified as a high severity vulnerability due to its potential to allow remote code execution.
To fix CVE-2008-2357, users should upgrade to the latest version of MTR that addresses this buffer overflow issue.
CVE-2008-2357 affects MTR versions before 0.73, including all versions from 0.21 to 0.72.
CVE-2008-2357 is a stack-based buffer overflow vulnerability that can be exploited via a crafted DNS PTR record.
Yes, CVE-2008-2357 can be exploited remotely when the split_redraw function is invoked with the -p option in affected MTR versions.