CVE-2023-32726
3.9LOWThe vulnerability is caused by improper check for check if RDLENGTH does not overflow the buffer in response from DNS server.
Published: 12/18/2023Updated: 11/3/2025
Description
The vulnerability is caused by improper check for check if RDLENGTH does not overflow the buffer in response from DNS server.
AI AnalysisPowered by AI
Affected Products
zabbixzabbix-agent
zabbixzabbix-agent
zabbixzabbix-agent
zabbixzabbix-agent
7.0.0
zabbixzabbix-agent
7.0.0
References
- https://lists.debian.org/debian-lts-announce/2024/01/msg00012.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BYSYLA7VTHR25CBLYO5ZLEJFGU7HTHQB/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UMFKNV5E4LG2DIZNPRWQ2ENH75H6UEQT/
- https://support.zabbix.com/browse/ZBX-23855Vendor Advisory
- https://lists.debian.org/debian-lts-announce/2024/01/msg00012.html
- https://lists.debian.org/debian-lts-announce/2024/10/msg00000.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BYSYLA7VTHR25CBLYO5ZLEJFGU7HTHQB/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UMFKNV5E4LG2DIZNPRWQ2ENH75H6UEQT/
- https://support.zabbix.com/browse/ZBX-23855Vendor Advisory