Vulnerability Name:

CVE-2004-0789 (CCN-17996)

Assigned:2004-11-09
Published:2004-11-09
Updated:2017-07-11
Summary:Multiple implementations of the DNS protocol, including (1) Poslib 1.0.2-1 and earlier as used by Posadis, (2) Axis Network products before firmware 3.13, and (3) Men & Mice Suite 2.2x before 2.2.3 and 3.5.x before 3.5.2, allow remote attackers to cause a denial of service (CPU and network bandwidth consumption) by triggering a communications loop via (a) DNS query packets with localhost as a spoofed source address, or (b) a response packet that triggers a response packet.
CVSS v3 Severity:5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Low
CVSS v2 Severity:5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
Vulnerability Type:CWE-Other
Vulnerability Consequences:Denial of Service
References:Source: CCN
Type: Men and Mice FTP site
FTP site

Source: MITRE
Type: CNA
CVE-2004-0789

Source: CCN
Type: SA13145
Axis Products DNS Implementation Denial of Service Vulnerability

Source: SECUNIA
Type: Patch
13145

Source: CCN
Type: SECTRACK ID: 1012157
Axis Network Camera DNS Loopback Error Lets Remote Users Deny Service

Source: SECTRACK
Type: Patch
1012157

Source: CCN
Type: Axis Firmware Technical Support Web page
Axis Firmware

Source: CCN
Type: NISCC Vulnerability Advisory 758884/NISCC/DNS
Vulnerability Issues in Implementations of the DNS Protocol

Source: MISC
Type: Vendor Advisory
http://www.niscc.gov.uk/niscc/docs/al-20041130-00862.html?lang=en

Source: MISC
Type: Vendor Advisory
http://www.niscc.gov.uk/niscc/docs/re-20041109-00957.pdf

Source: CONFIRM
Type: Patch, Vendor Advisory
http://www.posadis.org/advisories/pos_adv_006.txt

Source: CCN
Type: Poslib multiple vulnerabilities fix [23-12-2003]
Poslib advisory

Source: BID
Type: Patch
11642

Source: CCN
Type: BID-11642
Multiple Vendor DNS Response Flooding Denial Of Service Vulnerability

Source: XF
Type: UNKNOWN
dns-response-dos(17996)

Source: XF
Type: UNKNOWN
dns-localhost-dos(17997)

Vulnerable Configuration:Configuration 1:
  • cpe:/a:delegate:delegate:7.7.0:*:*:*:*:*:*:*
  • OR cpe:/a:delegate:delegate:7.7.1:*:*:*:*:*:*:*
  • OR cpe:/a:delegate:delegate:7.8.0:*:*:*:*:*:*:*
  • OR cpe:/a:delegate:delegate:7.8.1:*:*:*:*:*:*:*
  • OR cpe:/a:delegate:delegate:7.8.2:*:*:*:*:*:*:*
  • OR cpe:/a:delegate:delegate:7.9.11:*:*:*:*:*:*:*
  • OR cpe:/a:delegate:delegate:8.3.3:*:*:*:*:*:*:*
  • OR cpe:/a:delegate:delegate:8.3.4:*:*:*:*:*:*:*
  • OR cpe:/a:delegate:delegate:8.4.0:*:*:*:*:*:*:*
  • OR cpe:/a:delegate:delegate:8.5.0:*:*:*:*:*:*:*
  • OR cpe:/a:delegate:delegate:8.9:*:*:*:*:*:*:*
  • OR cpe:/a:delegate:delegate:8.9.1:*:*:*:*:*:*:*
  • OR cpe:/a:delegate:delegate:8.9.2:*:*:*:*:*:*:*
  • OR cpe:/a:delegate:delegate:8.9.3:*:*:*:*:*:*:*
  • OR cpe:/a:delegate:delegate:8.9.4:*:*:*:*:*:*:*
  • OR cpe:/a:delegate:delegate:8.9.5:*:*:*:*:*:*:*
  • OR cpe:/a:dnrd:dnrd:1.0:*:*:*:*:*:*:*
  • OR cpe:/a:dnrd:dnrd:1.1:*:*:*:*:*:*:*
  • OR cpe:/a:dnrd:dnrd:1.2:*:*:*:*:*:*:*
  • OR cpe:/a:dnrd:dnrd:1.3:*:*:*:*:*:*:*
  • OR cpe:/a:dnrd:dnrd:1.4:*:*:*:*:*:*:*
  • OR cpe:/a:dnrd:dnrd:2.0:*:*:*:*:*:*:*
  • OR cpe:/a:dnrd:dnrd:2.1:*:*:*:*:*:*:*
  • OR cpe:/a:dnrd:dnrd:2.2:*:*:*:*:*:*:*
  • OR cpe:/a:dnrd:dnrd:2.3:*:*:*:*:*:*:*
  • OR cpe:/a:dnrd:dnrd:2.4:*:*:*:*:*:*:*
  • OR cpe:/a:dnrd:dnrd:2.5:*:*:*:*:*:*:*
  • OR cpe:/a:dnrd:dnrd:2.6:*:*:*:*:*:*:*
  • OR cpe:/a:dnrd:dnrd:2.7:*:*:*:*:*:*:*
  • OR cpe:/a:dnrd:dnrd:2.8:*:*:*:*:*:*:*
  • OR cpe:/a:dnrd:dnrd:2.9:*:*:*:*:*:*:*
  • OR cpe:/a:dnrd:dnrd:2.10:*:*:*:*:*:*:*
  • OR cpe:/a:don_moore:mydns:0.6:*:*:*:*:*:*:*
  • OR cpe:/a:don_moore:mydns:0.7:*:*:*:*:*:*:*
  • OR cpe:/a:don_moore:mydns:0.8:*:*:*:*:*:*:*
  • OR cpe:/a:don_moore:mydns:0.9:*:*:*:*:*:*:*
  • OR cpe:/a:don_moore:mydns:0.10.0:*:*:*:*:*:*:*
  • OR cpe:/a:maradns:maradns:0.5.28:*:*:*:*:*:*:*
  • OR cpe:/a:maradns:maradns:0.5.29:*:*:*:*:*:*:*
  • OR cpe:/a:maradns:maradns:0.5.30:*:*:*:*:*:*:*
  • OR cpe:/a:maradns:maradns:0.5.31:*:*:*:*:*:*:*
  • OR cpe:/a:maradns:maradns:0.8.05:*:*:*:*:*:*:*
  • OR cpe:/a:pliant:pliant_dns_server:*:*:*:*:*:*:*:*
  • OR cpe:/a:posadis:posadis:0.50.4:*:*:*:*:*:*:*
  • OR cpe:/a:posadis:posadis:0.50.5:*:*:*:*:*:*:*
  • OR cpe:/a:posadis:posadis:0.50.6:*:*:*:*:*:*:*
  • OR cpe:/a:posadis:posadis:0.50.7:*:*:*:*:*:*:*
  • OR cpe:/a:posadis:posadis:0.50.8:*:*:*:*:*:*:*
  • OR cpe:/a:posadis:posadis:0.50.9:*:*:*:*:*:*:*
  • OR cpe:/a:posadis:posadis:0.60.0:*:*:*:*:*:*:*
  • OR cpe:/a:posadis:posadis:0.60.1:*:*:*:*:*:*:*
  • OR cpe:/a:posadis:posadis:m5pre1:*:*:*:*:*:*:*
  • OR cpe:/a:posadis:posadis:m5pre2:*:*:*:*:*:*:*
  • OR cpe:/a:qbik:wingate:3.0:*:*:*:*:*:*:*
  • OR cpe:/a:qbik:wingate:4.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:qbik:wingate:4.1_beta_a:*:*:*:*:*:*:*
  • OR cpe:/a:qbik:wingate:6.0:*:*:*:*:*:*:*
  • OR cpe:/a:qbik:wingate:6.0.1_build_993:*:*:*:*:*:*:*
  • OR cpe:/a:qbik:wingate:6.0.1_build_995:*:*:*:*:*:*:*
  • OR cpe:/a:team_johnlong:raidendnsd:*:*:*:*:*:*:*:*

  • Configuration 2:
  • cpe:/h:axis:2100_network_camera:2.0:*:*:*:*:*:*:*
  • OR cpe:/h:axis:2100_network_camera:2.01:*:*:*:*:*:*:*
  • OR cpe:/h:axis:2100_network_camera:2.02:*:*:*:*:*:*:*
  • OR cpe:/h:axis:2100_network_camera:2.03:*:*:*:*:*:*:*
  • OR cpe:/h:axis:2100_network_camera:2.12:*:*:*:*:*:*:*
  • OR cpe:/h:axis:2100_network_camera:2.30:*:*:*:*:*:*:*
  • OR cpe:/h:axis:2100_network_camera:2.31:*:*:*:*:*:*:*
  • OR cpe:/h:axis:2100_network_camera:2.32:*:*:*:*:*:*:*
  • OR cpe:/h:axis:2100_network_camera:2.33:*:*:*:*:*:*:*
  • OR cpe:/h:axis:2100_network_camera:2.34:*:*:*:*:*:*:*
  • OR cpe:/h:axis:2100_network_camera:2.40:*:*:*:*:*:*:*
  • OR cpe:/h:axis:2100_network_camera:2.41:*:*:*:*:*:*:*
  • OR cpe:/h:axis:2110_network_camera:2.12:*:*:*:*:*:*:*
  • OR cpe:/h:axis:2110_network_camera:2.30:*:*:*:*:*:*:*
  • OR cpe:/h:axis:2110_network_camera:2.31:*:*:*:*:*:*:*
  • OR cpe:/h:axis:2110_network_camera:2.32:*:*:*:*:*:*:*
  • OR cpe:/h:axis:2110_network_camera:2.34:*:*:*:*:*:*:*
  • OR cpe:/h:axis:2110_network_camera:2.40:*:*:*:*:*:*:*
  • OR cpe:/h:axis:2110_network_camera:2.41:*:*:*:*:*:*:*
  • OR cpe:/h:axis:2120_network_camera:2.12:*:*:*:*:*:*:*
  • OR cpe:/h:axis:2120_network_camera:2.30:*:*:*:*:*:*:*
  • OR cpe:/h:axis:2120_network_camera:2.31:*:*:*:*:*:*:*
  • OR cpe:/h:axis:2120_network_camera:2.32:*:*:*:*:*:*:*
  • OR cpe:/h:axis:2120_network_camera:2.34:*:*:*:*:*:*:*
  • OR cpe:/h:axis:2120_network_camera:2.40:*:*:*:*:*:*:*
  • OR cpe:/h:axis:2120_network_camera:2.41:*:*:*:*:*:*:*
  • OR cpe:/h:axis:2400_video_server:3.11:*:*:*:*:*:*:*
  • OR cpe:/h:axis:2400_video_server:3.12:*:*:*:*:*:*:*
  • OR cpe:/h:axis:2401_video_server:3.12:*:*:*:*:*:*:*
  • OR cpe:/h:axis:2420_network_camera:2.12:*:*:*:*:*:*:*
  • OR cpe:/h:axis:2420_network_camera:2.30:*:*:*:*:*:*:*
  • OR cpe:/h:axis:2420_network_camera:2.31:*:*:*:*:*:*:*
  • OR cpe:/h:axis:2420_network_camera:2.32:*:*:*:*:*:*:*
  • OR cpe:/h:axis:2420_network_camera:2.33:*:*:*:*:*:*:*
  • OR cpe:/h:axis:2420_network_camera:2.34:*:*:*:*:*:*:*
  • OR cpe:/h:axis:2420_network_camera:2.40:*:*:*:*:*:*:*
  • OR cpe:/h:axis:2420_network_camera:2.41:*:*:*:*:*:*:*
  • OR cpe:/h:axis:2460_network_dvr:3.12:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Vulnerability Name:

    CVE-2004-0789 (CCN-17997)

    Assigned:2004-11-09
    Published:2004-11-09
    Updated:2004-11-09
    Summary:Multiple vendor implementations of the DNS (Domain Name System) protocol are vulnerable to a denial of service attack. A remote attacker could send a spoofed DNS query that appears to come from the localhost on UDP port 53, which would cause the server to continuously respond to itself, resulting in a denial of service.
    CVSS v3 Severity:5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)
    Exploitability Metrics:Attack Vector (AV): Network
    Attack Complexity (AC): Low
    Privileges Required (PR): None
    User Interaction (UI): None
    Scope:Scope (S): Unchanged
    Impact Metrics:Confidentiality (C): None
    Integrity (I): None
    Availibility (A): Low
    CVSS v2 Severity:5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
    Exploitability Metrics:Access Vector (AV): Network
    Access Complexity (AC): Low
    Authentication (Au): None
    Impact Metrics:Confidentiality (C): None
    Integrity (I): None
    Availibility (A): Partial
    5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
    Exploitability Metrics:Access Vector (AV): Network
    Access Complexity (AC): Low
    Athentication (Au): None
    Impact Metrics:Confidentiality (C): None
    Integrity (I): None
    Availibility (A): Partial
    Vulnerability Consequences:Denial of Service
    References:Source: CCN
    Type: Men and Mice FTP site
    FTP site

    Source: MITRE
    Type: CNA
    CVE-2004-0789

    Source: CCN
    Type: SA13145
    Axis Products DNS Implementation Denial of Service Vulnerability

    Source: CCN
    Type: SECTRACK ID: 1012157
    Axis Network Camera DNS Loopback Error Lets Remote Users Deny Service

    Source: CCN
    Type: Axis Firmware Technical Support Web page
    Axis Firmware

    Source: CCN
    Type: NISCC Vulnerability Advisory 758884/NISCC/DNS
    Vulnerability Issues in Implementations of the DNS Protocol

    Source: CCN
    Type: Poslib multiple vulnerabilities fix [23-12-2003]
    Poslib advisory

    Source: CCN
    Type: BID-11642
    Multiple Vendor DNS Response Flooding Denial Of Service Vulnerability

    Source: XF
    Type: UNKNOWN
    dns-localhost-dos(17997)

    BACK
    delegate delegate 7.7.0
    delegate delegate 7.7.1
    delegate delegate 7.8.0
    delegate delegate 7.8.1
    delegate delegate 7.8.2
    delegate delegate 7.9.11
    delegate delegate 8.3.3
    delegate delegate 8.3.4
    delegate delegate 8.4.0
    delegate delegate 8.5.0
    delegate delegate 8.9
    delegate delegate 8.9.1
    delegate delegate 8.9.2
    delegate delegate 8.9.3
    delegate delegate 8.9.4
    delegate delegate 8.9.5
    dnrd dnrd 1.0
    dnrd dnrd 1.1
    dnrd dnrd 1.2
    dnrd dnrd 1.3
    dnrd dnrd 1.4
    dnrd dnrd 2.0
    dnrd dnrd 2.1
    dnrd dnrd 2.2
    dnrd dnrd 2.3
    dnrd dnrd 2.4
    dnrd dnrd 2.5
    dnrd dnrd 2.6
    dnrd dnrd 2.7
    dnrd dnrd 2.8
    dnrd dnrd 2.9
    dnrd dnrd 2.10
    don_moore mydns 0.6
    don_moore mydns 0.7
    don_moore mydns 0.8
    don_moore mydns 0.9
    don_moore mydns 0.10.0
    maradns maradns 0.5.28
    maradns maradns 0.5.29
    maradns maradns 0.5.30
    maradns maradns 0.5.31
    maradns maradns 0.8.05
    pliant pliant dns server *
    posadis posadis 0.50.4
    posadis posadis 0.50.5
    posadis posadis 0.50.6
    posadis posadis 0.50.7
    posadis posadis 0.50.8
    posadis posadis 0.50.9
    posadis posadis 0.60.0
    posadis posadis 0.60.1
    posadis posadis m5pre1
    posadis posadis m5pre2
    qbik wingate 3.0
    qbik wingate 4.0.1
    qbik wingate 4.1_beta_a
    qbik wingate 6.0
    qbik wingate 6.0.1_build_993
    qbik wingate 6.0.1_build_995
    team_johnlong raidendnsd *
    axis 2100 network camera 2.0
    axis 2100 network camera 2.01
    axis 2100 network camera 2.02
    axis 2100 network camera 2.03
    axis 2100 network camera 2.12
    axis 2100 network camera 2.30
    axis 2100 network camera 2.31
    axis 2100 network camera 2.32
    axis 2100 network camera 2.33
    axis 2100 network camera 2.34
    axis 2100 network camera 2.40
    axis 2100 network camera 2.41
    axis 2110 network camera 2.12
    axis 2110 network camera 2.30
    axis 2110 network camera 2.31
    axis 2110 network camera 2.32
    axis 2110 network camera 2.34
    axis 2110 network camera 2.40
    axis 2110 network camera 2.41
    axis 2120 network camera 2.12
    axis 2120 network camera 2.30
    axis 2120 network camera 2.31
    axis 2120 network camera 2.32
    axis 2120 network camera 2.34
    axis 2120 network camera 2.40
    axis 2120 network camera 2.41
    axis 2400 video server 3.11
    axis 2400 video server 3.12
    axis 2401 video server 3.12
    axis 2420 network camera 2.12
    axis 2420 network camera 2.30
    axis 2420 network camera 2.31
    axis 2420 network camera 2.32
    axis 2420 network camera 2.33
    axis 2420 network camera 2.34
    axis 2420 network camera 2.40
    axis 2420 network camera 2.41
    axis 2460 network dvr 3.12