First published: Tue Oct 22 2024(Updated: )
Integer Overflow in fast_ping.c in SmartDNS Release46 allows remote attackers to cause a Denial of Service via misaligned memory access.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
SmartDNS | ||
debian/smartdns | 33+dfsg-2.1 40+dfsg-1 46.1+dfsg-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-42643 has been classified as a high severity vulnerability due to its potential to cause denial of service.
To fix CVE-2024-42643, update to the patched versions of SmartDNS, specifically any version after 46.1+dfsg-1.
CVE-2024-42643 is caused by an integer overflow in the fast_ping.c file that allows for misaligned memory access.
Affected versions for CVE-2024-42643 include SmartDNS Release46 and its variants prior to the patched versions.
Yes, CVE-2024-42643 can be exploited remotely, allowing attackers to trigger a denial of service.