Vulnerability Name: | CVE-2005-2316 (CCN-21511) |
Assigned: | 2005-07-22 |
Published: | 2005-07-22 |
Updated: | 2008-09-05 |
Summary: | Domain Name Relay Daemon (DNRD) before 2.19.1 allows remote attackers to cause a denial of service (infinite recursion) via a DNS packet that uses message compression in the QNAME and two pointers that point to each other (circular buffer).
|
CVSS v3 Severity: | 5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)Exploitability Metrics: | Attack Vector (AV): Network Attack Complexity (AC): Low Privileges Required (PR): None User Interaction (UI): None | Scope: | Scope (S): Unchanged
| Impact Metrics: | Confidentiality (C): None Integrity (I): None Availibility (A): Low |
|
CVSS v2 Severity: | 5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)Exploitability Metrics: | Access Vector (AV): Network Access Complexity (AC): Low Authentication (Au): None | Impact Metrics: | Confidentiality (C): None Integrity (I): None Availibility (A): Partial | 5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)Exploitability Metrics: | Access Vector (AV): Network Access Complexity (AC): Low Athentication (Au): None
| Impact Metrics: | Confidentiality (C): None Integrity (I): None Availibility (A): Partial |
|
Vulnerability Type: | CWE-Other
|
Vulnerability Consequences: | Gain Access |
References: | Source: MITRE Type: CNA CVE-2005-2316
Source: CCN Type: DNRD Web page What DNRD is
Source: CCN Type: SA16142 Domain Name Relay Daemon Two Vulnerabilities
Source: SECUNIA Type: Patch, Vendor Advisory 16142
Source: CCN Type: SECTRACK ID: 1014557 Domain Name Relay Daemon (DNRD) Buffer Overflows May Let Remote Users Execute Arbitrary Code
Source: SECTRACK Type: UNKNOWN 1014557
Source: CONFIRM Type: Patch http://sourceforge.net/forum/forum.php?forum_id=482568
Source: CONFIRM Type: UNKNOWN http://www.FreeBSD.org/ports/portaudit/e72fd82b-fa01-11d9-bc08-0001020eed82.html
Source: CCN Type: OSVDB ID: 18151 Domain Name Relay Daemon (DNRD) Infinite Recursion Overflow
Source: XF Type: UNKNOWN dnrd-qname-bo(21511)
|
Vulnerable Configuration: | Configuration 1: cpe:/a:dnrd:dnrd:2.0:*:*:*:*:*:*:*OR cpe:/a:dnrd:dnrd:2.1:*:*:*:*:*:*:*OR cpe:/a:dnrd:dnrd:2.2:*:*:*:*:*:*:*OR cpe:/a:dnrd:dnrd:2.3:*:*:*:*:*:*:*OR cpe:/a:dnrd:dnrd:2.4:*:*:*:*:*:*:*OR cpe:/a:dnrd:dnrd:2.5:*:*:*:*:*:*:*OR cpe:/a:dnrd:dnrd:2.6:*:*:*:*:*:*:*OR cpe:/a:dnrd:dnrd:2.7:*:*:*:*:*:*:*OR cpe:/a:dnrd:dnrd:2.8:*:*:*:*:*:*:*OR cpe:/a:dnrd:dnrd:2.9:*:*:*:*:*:*:*OR cpe:/a:dnrd:dnrd:2.10:*:*:*:*:*:*:*OR cpe:/a:dnrd:dnrd:2.11:*:*:*:*:*:*:*OR cpe:/a:dnrd:dnrd:2.12:*:*:*:*:*:*:*OR cpe:/a:dnrd:dnrd:2.12.1:*:*:*:*:*:*:*OR cpe:/a:dnrd:dnrd:2.13:*:*:*:*:*:*:*OR cpe:/a:dnrd:dnrd:2.14:*:*:*:*:*:*:*OR cpe:/a:dnrd:dnrd:2.14.1:*:*:*:*:*:*:*OR cpe:/a:dnrd:dnrd:2.15:*:*:*:*:*:*:*OR cpe:/a:dnrd:dnrd:2.16:*:*:*:*:*:*:*OR cpe:/a:dnrd:dnrd:2.16.1:*:*:*:*:*:*:*OR cpe:/a:dnrd:dnrd:2.17.1:*:*:*:*:*:*:*OR cpe:/a:dnrd:dnrd:2.17.2:*:*:*:*:*:*:*OR cpe:/a:dnrd:dnrd:2.18:*:*:*:*:*:*:*OR cpe:/a:dnrd:dnrd:2.19:*:*:*:*:*:*:*
Denotes that component is vulnerable |
BACK |