CVE-2014-3484

9.8 CRITICAL

📋 TL;DR

CVE-2014-3484 is a critical vulnerability in musl libc's DNS response parser that allows remote attackers to trigger stack-based buffer overflows via specially crafted DNS responses. This can lead to denial of service (crash) or potentially arbitrary code execution. Systems using vulnerable versions of musl libc are affected, particularly those processing DNS responses from untrusted sources.

💻 Affected Systems

Products:
  • musl libc
Versions: musl libc 1.1x before 1.1.2, and versions 0.9.13 through 1.0.3
Operating Systems: Linux distributions using musl libc (Alpine Linux, others)
Default Config Vulnerable: ⚠️ Yes
Notes: Any application using musl libc's DNS resolution functions (like getaddrinfo) is vulnerable when processing DNS responses.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to full system compromise, allowing attackers to execute arbitrary commands with the privileges of the affected process.

🟠

Likely Case

Denial of service through application or system crash when processing malicious DNS responses, disrupting service availability.

🟢

If Mitigated

Limited impact if systems are patched, use network segmentation, or restrict DNS queries to trusted sources only.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires sending malicious DNS responses to vulnerable systems, which can be achieved through DNS poisoning or man-in-the-middle attacks.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: musl libc 1.1.2 or later, or versions patched with commit b3d9e0b94ea73c68ef4169ec82c898ce59a4e30a

Vendor Advisory: http://seclists.org/oss-sec/2014/q2/495

Restart Required: Yes

Instructions:

1. Update musl libc to version 1.1.2 or later. 2. For Alpine Linux: run 'apk update && apk upgrade musl'. 3. Recompile any statically linked applications with the patched library. 4. Restart affected services or reboot the system.

🔧 Temporary Workarounds

Restrict DNS Sources

linux

Configure systems to use only trusted DNS servers and implement DNS response validation.

Configure /etc/resolv.conf to point to trusted DNS servers only
Use iptables to block outgoing DNS queries to untrusted servers: iptables -A OUTPUT -p udp --dport 53 -j DROP

Network Segmentation

all

Isolate vulnerable systems from untrusted networks to prevent exposure to malicious DNS responses.

🧯 If You Can't Patch

  • Implement strict network controls to limit DNS traffic to trusted sources only.
  • Monitor systems for crashes or unusual DNS activity and have incident response plans ready.

🔍 How to Verify

Check if Vulnerable:

Check musl libc version: run 'ldd --version' or 'musl-gcc --version' and compare against affected versions (0.9.13-1.0.3, 1.1x before 1.1.2).

Check Version:

ldd --version 2>&1 | grep -i musl || musl-gcc --version 2>&1 | head -1

Verify Fix Applied:

Verify musl libc version is 1.1.2 or later, or check if the patch commit b3d9e0b94ea73c68ef4169ec82c898ce59a4e30a is applied.

📡 Detection & Monitoring

Log Indicators:

  • Application crashes or segmentation faults in processes using DNS resolution
  • Unusual DNS query patterns or responses in system logs

Network Indicators:

  • DNS responses with malformed or unusually long name fields
  • Unexpected DNS traffic from untrusted sources

SIEM Query:

source="*syslog*" AND ("segmentation fault" OR "SIGSEGV") AND process="*dns*" OR "*getaddrinfo*"

🔗 References

📤 Share & Export