First published: Tue Apr 12 2016(Updated: )
The DNS::GetResult function in dns.cpp in InspIRCd before 2.0.19 allows remote DNS servers to cause a denial of service (netsplit) via an invalid character in a PTR response, as demonstrated by a "\032" (whitespace) character in a hostname.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Debian GNU/Linux | =7.0 | |
Debian GNU/Linux | =8.0 | |
InspIRCd | <=2.0.18 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-8702 is classified as a denial of service vulnerability that can lead to a netsplit in InspIRCd.
To mitigate CVE-2015-8702, users should upgrade to InspIRCd version 2.0.19 or later.
InspIRCd versions prior to 2.0.19 and Debian GNU/Linux versions 7.0 and 8.0 are affected by CVE-2015-8702.
CVE-2015-8702 allows remote DNS servers to cause a denial of service through invalid characters in PTR responses.
CVE-2015-8702 was discovered and disclosed in April 2015.