CVE-2017-9430

CRITICAL

dnstracer <1.9 - DoS

Title source: llm

Description

Stack-based buffer overflow in dnstracer through 1.9 allows attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a command line with a long name argument that is mishandled in a strcpy call for argv[0]. An example threat model is a web application that launches dnstracer with an untrusted name string.

Exploits (4)

exploitdb WORKING POC VERIFIED
by FarazPajohan · textdoslinux
https://www.exploit-db.com/exploits/42115
exploitdb WORKING POC
by j0lama · pythonlocallinux
https://www.exploit-db.com/exploits/42424
nomisec WORKING POC
by j0lama · poc
https://github.com/j0lama/Dnstracer-1.9-Fix
nomisec WORKING POC
by homjxi0e · poc
https://github.com/homjxi0e/CVE-2017-9430

Scores

CVSS v3 9.8
EPSS 0.1469
EPSS Percentile 94.5%
Attack Vector NETWORK
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Details

CWE
CWE-119
Status published
Products (1)
dnstracer_project/dnstracer < 1.9
Published Jun 05, 2017
Tracked Since Feb 18, 2026