{ "id": "CVE-2023-50434", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-29T22:15:06.883", "lastModified": "2024-04-30T13:11:16.690", "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "emdns_resolve_raw in emdns.c in emdns through fbd1eef calls strlen with an input that may not be '\\0' terminated, leading to a stack-based buffer over-read. This can be triggered by a remote adversary that can send DNS requests to the emdns server. The impact could vary depending on the system libraries, compiler, and processor architecture. Code before be565c3 is unaffected." }, { "lang": "es", "value": "emdns_resolve_raw en emdns.c en emdns a trav\u00e9s de fbd1eef llama a strlen con una entrada que puede no estar terminada en '\\0', lo que provoca una sobrelectura del b\u00fafer basado en pila. Esto puede ser provocado por un adversario remoto que puede enviar solicitudes DNS al servidor emdns. El impacto podr\u00eda variar seg\u00fan las librer\u00edas del sistema, el compilador y la arquitectura del procesador. El c\u00f3digo anterior a be565c3 no se ve afectado." } ], "metrics": {}, "references": [ { "url": "https://papers.mathyvanhoef.com/esorics2024.pdf", "source": "cve@mitre.org" } ] }