Vulnerability CVE-2004-0789


Published: 2004-12-31   Modified: 2012-02-12

Description:
Multiple implementations of the DNS protocol, including (1) Poslib 1.0.2-1 and earlier as used by Posadis, (2) Axis Network products before firmware 3.13, and (3) Men & Mice Suite 2.2x before 2.2.3 and 3.5.x before 3.5.2, allow remote attackers to cause a denial of service (CPU and network bandwidth consumption) by triggering a communications loop via (a) DNS query packets with localhost as a spoofed source address, or (b) a response packet that triggers a response packet.

CVSS2 => (AV:N/AC:L/Au:N/C:N/I:N/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
5/10
2.9/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
None
None
Partial
Affected software
Team johnlong -> Raidendnsd 
QBIK -> Wingate 
Posadis -> Posadis 
Pliant -> Pliant dns server 
Maradns -> Maradns 
Don moore -> Mydns 
DNRD -> DNRD 
Delegate -> Delegate 
AXIS -> 2100 network camera 
AXIS -> 2110 network camera 
AXIS -> 2120 network camera 
AXIS -> 2400 video server 
AXIS -> 2401 video server 
AXIS -> 2420 network camera 
AXIS -> 2460 network dvr 

 References:
http://xforce.iss.net/xforce/xfdb/17997
http://www.securityfocus.com/bid/11642
http://www.posadis.org/advisories/pos_adv_006.txt
http://securitytracker.com/id?1012157
http://secunia.com/advisories/13145
http://www.niscc.gov.uk/niscc/docs/re-20041109-00957.pdf
http://www.niscc.gov.uk/niscc/docs/al-20041130-00862.html?lang=en

Copyright 2022, cxsecurity.com

 

Back to Top