
Cloud Vulnerability DB
A community-led vulnerabilities database
SmartDNS through version 41 contains a stack-based buffer overflow vulnerability in the dnsencode_domain function within the dns.c file (CVE-2023-31470). The vulnerability was discovered and reported on April 22, 2023, and affects all releases of SmartDNS up to version 41. The issue was fixed in commit 56d0332 (GitHub Patch).
The vulnerability exists due to insufficient bounds checking in the dnsencodedomain function in dns.c, which can be triggered by crafting a special DNS request. When processing DNS requests, the function can write outside the bounds of the packetbuff variable, leading to a stack buffer overflow. The issue has been assigned a CVSS v3.1 base score of 9.8 CRITICAL (Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) (NVD).
An attacker can exploit this vulnerability by sending a specially crafted DNS request to cause a denial of service (crash) or potentially execute arbitrary code (RCE) on the affected server. The vulnerability allows for out-of-bounds write access, which can lead to system compromise (GitHub Issue).
Users should upgrade to SmartDNS version after commit 56d0332. The fix includes adding proper bounds checking in the dnsencode_domain function to prevent buffer overflow conditions (GitHub Patch).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."