First published: Thu Jun 18 2020(Updated: )
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GNU adns | <1.5.2 | |
Fedoraproject Fedora | =31 | |
Fedoraproject Fedora | =32 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2017-9107 is high with a severity value of 7.5.
CVE-2017-9107 is a vulnerability in adns before 1.5.2 that allows buffer overrun when a domain ends with a backslash.
GNU adns versions up to 1.5.2, Fedoraproject Fedora 31, and Fedoraproject Fedora 32 are affected by CVE-2017-9107.
To fix CVE-2017-9107, upgrade GNU adns to version 1.5.2 or later, or update to a newer version of Fedoraproject Fedora.
Yes, you can find references for CVE-2017-9107 at the following links: [Link 1](http://www.chiark.greenend.org.uk/ucgi/~ianmdlvl/git?p=adns.git), [Link 2](http://www.chiark.greenend.org.uk/ucgi/~ianmdlvl/git?p=adns.git;a=blob;f=changelog), [Link 3](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TRVHN3GGVNQWAOL3PWC5FLAV7HUESLZR/)