|
|||
Rule General Information |
---|
Release Date: | 2015-03-26 | |
Rule Name: | EXPLOIT Freebsd Rtsold Dname_labeldec Stack Buffer Overflow Vulnerability (CVE-2014-3954) | |
Severity: | ||
CVE ID: | ||
Rule Protection Details |
---|
Description: | Stack-based buffer overflow in rtsold in FreeBSD 9.1 through 10.1-RC2 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via crafted DNS parameters in a router advertisement message. | |
Impact: | A buffer overflow vulnerability can be triggered by an attacker in the context of the vulnerable product. Further attacks include arbitrary code execution and denial of service. | |
Affected OS: | FreeBSD, Linux | |
Reference: | SecurityTrackerID:1031098 |
|
Solutions |
---|
More advisories have been published on the website, please visit for more suggestions: https://www.freebsd.org/security/advisories/FreeBSD-SA-14:20.rtsold.asc |