Impact
The vulnerability exists in the deprecated ndns printing functions ns_printrrf, ns_printrr, and fp_nquery of the GNU C Library, starting with version 2.2. The functions do not check the size of the caller-supplied buffer, which can cause an out‑of‑bounds write when printing TSIG records. This memory corruption could lead to data corruption, unstable behaviour, or exploitation that allows arbitrary code execution, depending on the attacker’s ability to control the input data.
Affected Systems
All systems that use the GNU C Library (glibc) version 2.2 or newer are affected, regardless of the distribution or operating system. The vulnerability is tied to the built‑in DNS module that processes TSIG records.
Risk and Exploitability
The CVSS score of 7.3 indicates a high risk level. EPSS is not available, and the vulnerability is not listed in CISA KEV, implying no known active exploitation yet. The likely attack vector is via a crafted DNS query containing a malicious TSIG record, so network‑based administrators should monitor outgoing DNS traffic for suspicious characteristics. The magnitude of impact could be system‑wide if the corrupted memory affects critical library functions.
OpenCVE Enrichment