The vulnerability is caused by improper check for check if RDLENGTH does not overflow the buffer in response from DNS server.
https://support.zabbix.com/browse/ZBX-23855
https://lists.fedoraproject.org/archives/list/[email protected]/message/UMFKNV5E4LG2DIZNPRWQ2ENH75H6UEQT/
https://lists.fedoraproject.org/archives/list/[email protected]/message/BYSYLA7VTHR25CBLYO5ZLEJFGU7HTHQB/
https://lists.debian.org/debian-lts-announce/2024/01/msg00012.html
Source: Mitre, NVD
Published: 2023-12-18
Updated: 2024-01-24
Base Score: 7.6
Vector: CVSS2#AV:N/AC:H/Au:N/C:C/I:C/A:C
Severity: High
Base Score: 8.1
Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H