First published: Wed Jul 03 2019(Updated: )
nsd-checkzone in NLnet Labs NSD 4.2.0 has a Stack-based Buffer Overflow in the dname_concatenate() function in dname.c.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Nlnetlabs Name Server Daemon | =4.2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-13207 is a vulnerability found in NLnet Labs NSD 4.2.0 where nsd-checkzone has a stack-based buffer overflow in the dname_concatenate() function in dname.c.
CVE-2019-13207 has a critical severity with a CVSS score of 9.8.
CVE-2019-13207 affects NLnet Labs NSD 4.2.0 by exploiting a stack-based buffer overflow in the dname_concatenate() function in dname.c.
To fix CVE-2019-13207, it is recommended to apply the necessary patches or updates provided by the vendor NLnet Labs.
Yes, you can find references for CVE-2019-13207 at the following links: [Reference 1](https://github.com/NLnetLabs/nsd/issues/20) and [Reference 2](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FDS4H7WVHQGCX3LF72F5K22VJXN7HDBB/)