cve/2019/CVE-2019-9747.md

18 lines
1.0 KiB
Markdown
Raw Normal View History

2024-06-07 04:52:01 +00:00
### [CVE-2019-9747](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9747)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
In tinysvcmdns through 2018-01-16, a maliciously crafted mDNS (Multicast DNS) packet triggers an infinite loop while parsing an mDNS query. When mDNS compressed labels point to each other, the function uncompress_nlabel goes into an infinite loop trying to analyze the packet with an mDNS query. As a result, the mDNS server hangs after receiving the malicious mDNS packet. NOTE: the product's web site states "This project is un-maintained, and has been since 2013. ... There are known vulnerabilities ... You are advised to NOT use this library for any new projects / products."
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/Samsung/cotopaxi