SheerDNS is prone to a buffer overflow when constructing responses to CNAME queries. This is due to insufficient bounds checking of lookup information which is fetched from local files. If an attacker can influence the contents of these files, then it will be possible to trigger this condition to corrupt adjacent regions of memory with malicious data. This could lead to a denial of service or execution of malicious instructions. This issue was discovered in SheerDNS version 1.0.0, however, earlier versions may also be affected.
SheerDNS is prone to a buffer overflow when constructing responses to CNAME queries. This is due to insufficient bounds checking of lookup information which is fetched from local files. If an attacker can influence the contents of these files, then it will be possible to trigger this condition to corrupt adjacent regions of memory with malicious data. This could lead to a denial of service or execution of malicious instructions. This issue was discovered in SheerDNS version 1.0.0, however, earlier versions may also be affected.