CVE-2014-3484
Linux Debian vulnerability analysis and mitigation

Overview

Multiple stack-based buffer overflows were discovered in the __dn_expand function in network/dn_expand.c in musl libc versions 0.9.13 through 1.0.3 and 1.1.x before 1.1.2. The vulnerability was identified in June 2014 and assigned CVE-2014-3484. The issue affects programs linked against musl libc that make DNS queries through standard interfaces like getaddrinfo, getnameinfo, gethostbyname, and gethostbyaddr (Openwall Musl).

Technical details

The vulnerability stems from incorrect validation of remaining output buffer space, introduced in commit fcc522c92335783293ac19df318415cd97fbf66b. This allows malformed input to write past the end of the buffer. Additionally, the loop detection logic failed to account for infinite loops with no output, which could cause the function to hang. The vulnerability has a CVSS v3.1 Base Score of 9.8 (CRITICAL) with vector CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H (NVD).

Impact

The vulnerability can be triggered if an attacker controls one of the configured nameservers in resolv.conf or can inject forged UDP packets with controlled contents. This could lead to arbitrary code execution or denial of service through infinite loops. The attack difficulty is considered moderate to high, being most feasible when the attacker has already compromised network infrastructure components like nameservers or routers (Openwall OSS).

Mitigation and workarounds

The issue was fixed in musl libc versions 1.0.3 and 1.1.2. While using a local caching nameserver may provide some mitigation, the recommended solution is to patch to a fixed version. A patch was made available for all affected versions through the musl_dn_expand_overflow_fix_v2.diff file (Openwall Musl).

Additional resources


SourceThis report was generated using AI

Related Linux Debian vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2026-22776HIGH8.7
  • Linux DebianLinux Debian
  • cpp-httplib
NoNoJan 12, 2026
CVE-2026-22801MEDIUM6.8
  • OpenJDK JDKOpenJDK JDK
  • java-1.8.0-openjdk-accessibility-fastdebug
NoYesJan 12, 2026
CVE-2026-22695MEDIUM6.1
  • OpenJDK JDKOpenJDK JDK
  • java-1.8.0-openjdk-javadoc-zip
NoYesJan 12, 2026
CVE-2026-22251MEDIUM5.3
  • PythonPython
  • wlc
NoYesJan 12, 2026
CVE-2026-0665N/AN/A
  • Linux DebianLinux Debian
  • qemu
NoNoJan 13, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management