An issue was discovered in adns before 1.5.2. adnshost mishandles a missing final newline on a stdin read. It is wrong to increment used as well as setting r, since used is incremented according to r, later. Rather one should be doing what read() would have done. Without this fix, adnshost may read and process one byte beyond the buffer, perhaps crashing or perhaps somehow leaking the value of that byte.
Advisories
Source ID Title
EUVD EUVD EUVD-2017-18046 An issue was discovered in adns before 1.5.2. adnshost mishandles a missing final newline on a stdin read. It is wrong to increment used as well as setting r, since used is incremented according to r, later. Rather one should be doing what read() would have done. Without this fix, adnshost may read and process one byte beyond the buffer, perhaps crashing or perhaps somehow leaking the value of that byte.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-05T16:55:22.246Z

Reserved: 2017-05-21T00:00:00

Link: CVE-2017-9108

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-06-18T14:15:10.593

Modified: 2024-11-21T03:35:20.200

Link: CVE-2017-9108

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.