First published: Thu Feb 20 2020(Updated: )
Last updated 24 July 2024
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Musl-libc Musl | >=0.9.13<=1.0.3 | |
Musl-libc Musl | >=1.1.0<1.1.2 | |
debian/musl | 1.2.2-1 1.2.3-1 1.2.5-1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2014-3484 is critical with a severity value of 9.8.
The affected software for CVE-2014-3484 is musl libc versions 0.9.13 through 1.0.3 and versions 1.1.0 through 1.1.2.
Remote attackers can exploit CVE-2014-3484 by causing a denial of service (crash) via an invalid DNS response or by having unspecified impact through an invalid name length in a DNS response.
The remedy for CVE-2014-3484 on Ubuntu is to update musl libc to version 0.9.15-1ubuntu0.1~ or higher.
The remedy for CVE-2014-3484 on Debian is to update musl libc to version 1.1.21-2, 1.2.2-1, or 1.2.3-1.