The vulnerability is caused by improper check for check if RDLENGTH does not overflow the buffer in response from DNS server.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-3717-1 | zabbix security update |
Debian DLA |
DLA-3909-1 | zabbix security update |
EUVD |
EUVD-2023-36953 | The vulnerability is caused by improper check for check if RDLENGTH does not overflow the buffer in response from DNS server. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Mon, 03 Nov 2025 22:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Status: PUBLISHED
Assigner: Zabbix
Published:
Updated: 2025-11-03T21:48:40.326Z
Reserved: 2023-05-11T21:25:43.368Z
Link: CVE-2023-32726
No data.
Status : Modified
Published: 2023-12-18T10:15:06.750
Modified: 2025-11-03T22:16:22.167
Link: CVE-2023-32726
No data.
OpenCVE Enrichment
No data.
Debian DLA
EUVD