In tinysvcmdns through 2018-01-16, a maliciously crafted mDNS (Multicast DNS) packet triggers an infinite loop while parsing an mDNS query. When mDNS compressed labels point to each other, the function uncompress_nlabel goes into an infinite loop trying to analyze the packet with an mDNS query. As a result, the mDNS server hangs after receiving the malicious mDNS packet. NOTE: the product's web site states "This project is un-maintained, and has been since 2013. ... There are known vulnerabilities ... You are advised to NOT use this library for any new projects / products."
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: mitre
Published: 2019-03-13T19:00:00Z
Updated: 2024-09-16T22:25:09.752Z
Reserved: 2019-03-13T00:00:00Z
Link: CVE-2019-9747
Vulnrichment
No data.
NVD
Status : Modified
Published: 2019-03-13T19:29:00.207
Modified: 2024-11-21T04:52:13.700
Link: CVE-2019-9747
Redhat
No data.