First published: Fri Apr 28 2023(Updated: )
SmartDNS through 41 before 56d0332 allows an out-of-bounds write because of a stack-based buffer overflow in the _dns_encode_domain function in the dns.c file, via a crafted DNS request.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
SmartDNS | <=41 | |
pymumu smartdns | <=41 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-31470 has been classified with a high severity due to the potential for remote exploitation via crafted DNS requests.
To fix CVE-2023-31470, upgrade SmartDNS to version 56d0332 or later, which addresses the buffer overflow vulnerability.
CVE-2023-31470 affects versions of SmartDNS up to 41, including both the SmartDNS Project and pymumu's SmartDNS variants.
The impact of CVE-2023-31470 includes potential unauthorized access and system compromise due to the out-of-bounds write caused by buffer overflow.
There is no specific information indicating that CVE-2023-31470 is currently under active exploitation as of the last reports.