This vulnerability has been modified since it was last analyzed by the NVD. It is awaiting reanalysis which may result in further changes to the information provided.
Stack-based buffer overflow in dnstracer through 1.9 allows attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a command line with a long name argument that is mishandled in a strcpy call for argv. An example threat model is a web application that launches dnstracer with an untrusted name string.
CVSS 3.x Severity and Metrics:
CVSS 2.0 Severity and Metrics: