The vulnerability is rated HIGH due to the potential for an attacker to inject malicious data through reverse DNS packets, which can lead to information leakage or data corruption. The real-world exploitability is moderate as it requires specific conditions and network access.
A vulnerability exists in the handling of .ip6.arpa TLD reverse DNS zone response packets, which can allow attackers to inject malicious data. The impact includes potential for data corruption or information leakage. Network administrators and users with PacketSmith Yara-X Detection Module are affected.
Affected Systems
- PacketSmith Yara-X Detection Module
Affected Versions: All versions prior to the latest update that includes mitigation for this issue
Remediation
- Apply the latest updates from PacketSmith to mitigate this vulnerability.
- Update the Yara-X detection module to the most recent version available.
Stack Impact
This affects systems using DNS and reverse DNS lookup services, specifically with IPv6 configurations. No specific software versions of nginx, docker, linux kernel, openssh, curl, openssl, python, or homelab components are directly impacted.