Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2008-2357
PUBLISHED
More InfoOfficial Page
Assigner-mitre
Assigner Org ID-8254265b-2729-46b6-b9e3-3dfca2d5bfca
View Known Exploited Vulnerability (KEV) details
Published At-21 May, 2008 | 10:00
Updated At-07 Aug, 2024 | 08:58
Rejected At-
▼CVE Numbering Authority (CNA)

Stack-based buffer overflow in the split_redraw function in split.c in mtr before 0.73, when invoked with the -p (aka --split) option, allows remote attackers to execute arbitrary code via a crafted DNS PTR record. NOTE: it could be argued that this is a vulnerability in the ns_name_ntop function in resolv/ns_name.c in glibc and the proper fix should be in glibc; if so, then this should not be treated as a vulnerability in mtr.

Affected Products
Vendor
n/a
Product
n/a
Versions
Affected
  • n/a
Problem Types
TypeCWE IDDescription
textN/An/a
Type: text
CWE ID: N/A
Description: n/a
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://secunia.com/advisories/30340
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/30522
third-party-advisory
x_refsource_SECUNIA
http://www.securityfocus.com/archive/1/492260/100/0/threaded
mailing-list
x_refsource_BUGTRAQ
http://secunia.com/advisories/30312
third-party-advisory
x_refsource_SECUNIA
http://www.mandriva.com/security/advisories?name=MDVSA-2008:176
vendor-advisory
x_refsource_MANDRIVA
http://www.securityfocus.com/bid/29290
vdb-entry
x_refsource_BID
http://security.gentoo.org/glsa/glsa-200806-01.xml
vendor-advisory
x_refsource_GENTOO
http://www.openwall.com/lists/oss-security/2008/05/21/3
mailing-list
x_refsource_MLIST
http://secunia.com/advisories/30967
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/30359
third-party-advisory
x_refsource_SECUNIA
https://exchange.xforce.ibmcloud.com/vulnerabilities/42535
vdb-entry
x_refsource_XF
http://www.openwall.com/lists/oss-security/2008/05/21/4
mailing-list
x_refsource_MLIST
http://securityreason.com/securityalert/3903
third-party-advisory
x_refsource_SREASON
http://www.debian.org/security/2008/dsa-1587
vendor-advisory
x_refsource_DEBIAN
http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00001.html
vendor-advisory
x_refsource_SUSE
http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0175
x_refsource_CONFIRM
http://seclists.org/fulldisclosure/2008/May/0488.html
mailing-list
x_refsource_FULLDISC
http://www.openwall.com/lists/oss-security/2008/05/21/1
mailing-list
x_refsource_MLIST
http://www.securitytracker.com/id?1020046
vdb-entry
x_refsource_SECTRACK
https://issues.rpath.com/browse/RPL-2558
x_refsource_CONFIRM
ftp://ftp.bitwizard.nl/mtr/mtr-0.73.diff
x_refsource_CONFIRM
Hyperlink: http://secunia.com/advisories/30340
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/30522
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.securityfocus.com/archive/1/492260/100/0/threaded
Resource:
mailing-list
x_refsource_BUGTRAQ
Hyperlink: http://secunia.com/advisories/30312
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.mandriva.com/security/advisories?name=MDVSA-2008:176
Resource:
vendor-advisory
x_refsource_MANDRIVA
Hyperlink: http://www.securityfocus.com/bid/29290
Resource:
vdb-entry
x_refsource_BID
Hyperlink: http://security.gentoo.org/glsa/glsa-200806-01.xml
Resource:
vendor-advisory
x_refsource_GENTOO
Hyperlink: http://www.openwall.com/lists/oss-security/2008/05/21/3
Resource:
mailing-list
x_refsource_MLIST
Hyperlink: http://secunia.com/advisories/30967
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/30359
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/42535
Resource:
vdb-entry
x_refsource_XF
Hyperlink: http://www.openwall.com/lists/oss-security/2008/05/21/4
Resource:
mailing-list
x_refsource_MLIST
Hyperlink: http://securityreason.com/securityalert/3903
Resource:
third-party-advisory
x_refsource_SREASON
Hyperlink: http://www.debian.org/security/2008/dsa-1587
Resource:
vendor-advisory
x_refsource_DEBIAN
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00001.html
Resource:
vendor-advisory
x_refsource_SUSE
Hyperlink: http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0175
Resource:
x_refsource_CONFIRM
Hyperlink: http://seclists.org/fulldisclosure/2008/May/0488.html
Resource:
mailing-list
x_refsource_FULLDISC
Hyperlink: http://www.openwall.com/lists/oss-security/2008/05/21/1
Resource:
mailing-list
x_refsource_MLIST
Hyperlink: http://www.securitytracker.com/id?1020046
Resource:
vdb-entry
x_refsource_SECTRACK
Hyperlink: https://issues.rpath.com/browse/RPL-2558
Resource:
x_refsource_CONFIRM
Hyperlink: ftp://ftp.bitwizard.nl/mtr/mtr-0.73.diff
Resource:
x_refsource_CONFIRM
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://secunia.com/advisories/30340
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/30522
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.securityfocus.com/archive/1/492260/100/0/threaded
mailing-list
x_refsource_BUGTRAQ
x_transferred
http://secunia.com/advisories/30312
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.mandriva.com/security/advisories?name=MDVSA-2008:176
vendor-advisory
x_refsource_MANDRIVA
x_transferred
http://www.securityfocus.com/bid/29290
vdb-entry
x_refsource_BID
x_transferred
http://security.gentoo.org/glsa/glsa-200806-01.xml
vendor-advisory
x_refsource_GENTOO
x_transferred
http://www.openwall.com/lists/oss-security/2008/05/21/3
mailing-list
x_refsource_MLIST
x_transferred
http://secunia.com/advisories/30967
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/30359
third-party-advisory
x_refsource_SECUNIA
x_transferred
https://exchange.xforce.ibmcloud.com/vulnerabilities/42535
vdb-entry
x_refsource_XF
x_transferred
http://www.openwall.com/lists/oss-security/2008/05/21/4
mailing-list
x_refsource_MLIST
x_transferred
http://securityreason.com/securityalert/3903
third-party-advisory
x_refsource_SREASON
x_transferred
http://www.debian.org/security/2008/dsa-1587
vendor-advisory
x_refsource_DEBIAN
x_transferred
http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00001.html
vendor-advisory
x_refsource_SUSE
x_transferred
http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0175
x_refsource_CONFIRM
x_transferred
http://seclists.org/fulldisclosure/2008/May/0488.html
mailing-list
x_refsource_FULLDISC
x_transferred
http://www.openwall.com/lists/oss-security/2008/05/21/1
mailing-list
x_refsource_MLIST
x_transferred
http://www.securitytracker.com/id?1020046
vdb-entry
x_refsource_SECTRACK
x_transferred
https://issues.rpath.com/browse/RPL-2558
x_refsource_CONFIRM
x_transferred
ftp://ftp.bitwizard.nl/mtr/mtr-0.73.diff
x_refsource_CONFIRM
x_transferred
Hyperlink: http://secunia.com/advisories/30340
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/30522
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.securityfocus.com/archive/1/492260/100/0/threaded
Resource:
mailing-list
x_refsource_BUGTRAQ
x_transferred
Hyperlink: http://secunia.com/advisories/30312
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.mandriva.com/security/advisories?name=MDVSA-2008:176
Resource:
vendor-advisory
x_refsource_MANDRIVA
x_transferred
Hyperlink: http://www.securityfocus.com/bid/29290
Resource:
vdb-entry
x_refsource_BID
x_transferred
Hyperlink: http://security.gentoo.org/glsa/glsa-200806-01.xml
Resource:
vendor-advisory
x_refsource_GENTOO
x_transferred
Hyperlink: http://www.openwall.com/lists/oss-security/2008/05/21/3
Resource:
mailing-list
x_refsource_MLIST
x_transferred
Hyperlink: http://secunia.com/advisories/30967
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/30359
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/42535
Resource:
vdb-entry
x_refsource_XF
x_transferred
Hyperlink: http://www.openwall.com/lists/oss-security/2008/05/21/4
Resource:
mailing-list
x_refsource_MLIST
x_transferred
Hyperlink: http://securityreason.com/securityalert/3903
Resource:
third-party-advisory
x_refsource_SREASON
x_transferred
Hyperlink: http://www.debian.org/security/2008/dsa-1587
Resource:
vendor-advisory
x_refsource_DEBIAN
x_transferred
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00001.html
Resource:
vendor-advisory
x_refsource_SUSE
x_transferred
Hyperlink: http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0175
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://seclists.org/fulldisclosure/2008/May/0488.html
Resource:
mailing-list
x_refsource_FULLDISC
x_transferred
Hyperlink: http://www.openwall.com/lists/oss-security/2008/05/21/1
Resource:
mailing-list
x_refsource_MLIST
x_transferred
Hyperlink: http://www.securitytracker.com/id?1020046
Resource:
vdb-entry
x_refsource_SECTRACK
x_transferred
Hyperlink: https://issues.rpath.com/browse/RPL-2558
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: ftp://ftp.bitwizard.nl/mtr/mtr-0.73.diff
Resource:
x_refsource_CONFIRM
x_transferred
Details not found