Short Name |
DNS:GNUTLS-DANE-BOF |
---|---|
Severity |
Major |
Recommended |
No |
Category |
DNS |
Keywords |
GnuTLS DANE dane.c Heap Buffer Overflow |
Release Date |
2014/02/24 |
Update Number |
2348 |
Supported Platforms |
idp-4.0+, isg-3.0+, j-series-9.5+, mx-11.4+, srx-12.1+, srx-branch-12.1+, vmx-17.4+, vsrx-12.1+, vsrx3bsd-18.2+ |
This signature detects attempts to exploit a known vulnerability in GnuTLS. The vulnerability is due to an error in the function dane_query_tlsa() in libdane/dane.c while processing TLSA records. A remote attacker could exploit this vulnerability by enticing a vulnerable client to open a malicious domain name, and then sending more than 4 TLSA records in a DNS response during DANE verification. A successful attack can result in arbitrary code execution, while an unsuccessful one will cause the vulnerable client application to terminate.
Buffer overflow in the dane_query_tlsa function in the DANE library (libdane) in GnuTLS 3.1.x before 3.1.15 and 3.2.x before 3.2.5 allows remote servers to cause a denial of service (memory corruption) via a response with more than four DANE entries.