vulnerability
FreeBSD: VID-0282269d-bbee-11e6-b1cf-14dae9d210b8 (CVE-2016-6559): FreeBSD -- link_ntoa(3) buffer overflow
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 7 | (AV:N/AC:L/Au:N/C:P/I:P/A:P) | Dec 6, 2016 | Dec 9, 2016 | Dec 10, 2025 |
Severity
7
CVSS
(AV:N/AC:L/Au:N/C:P/I:P/A:P)
Published
Dec 6, 2016
Added
Dec 9, 2016
Modified
Dec 10, 2025
Description
Problem Description: A specially crafted argument can trigger a static buffer overflow in the library, with possibility to rewrite following static buffers that belong to other library functions. Impact: Due to very limited use of the function in the existing applications, and limited length of the overflow, exploitation of the vulnerability does not seem feasible. None of the utilities and daemons in the base system are known to be vulnerable. However, careful review of third party software that may use the function was not performed.
Solutions
freebsd-upgrade-base-11_0-release-p5freebsd-upgrade-base-10_3-release-p14freebsd-upgrade-base-10_2-release-p27freebsd-upgrade-base-10_1-release-p44freebsd-upgrade-base-9_3-release-p52
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.