musl libc before 1.1.17 has a buffer overflow via crafted DNS replies because dnsparsecallback in network/lookup_name.c does not restrict the number of addresses, and thus an attacker can provide an unexpected number by sending A records in a reply to an AAAA query.
{ "vanir_signatures": [ { "deprecated": false, "id": "CVE-2017-15650-0c40b056", "signature_version": "v1", "digest": { "line_hashes": [ "19105209796768762262057181071667862774", "337813073784692095994138226666901462849", "55846828187015184318840200573767133364", "76903974613516892053616754843570385638" ], "threshold": 0.9 }, "signature_type": "Line", "target": { "file": "src/network/lookup_name.c" }, "source": "http://git.musl-libc.org/git/musl@45ca5d3fcb6f874bf5ba55d0e9651cef68515395" }, { "deprecated": false, "id": "CVE-2017-15650-82c2c8f5", "signature_version": "v1", "digest": { "length": 789.0, "function_hash": "65063592785737742352495545225918919199" }, "signature_type": "Function", "target": { "function": "dns_parse_callback", "file": "src/network/lookup_name.c" }, "source": "http://git.musl-libc.org/git/musl@45ca5d3fcb6f874bf5ba55d0e9651cef68515395" } ] }