Vulnerability CVE-2006-2076


Published: 2006-04-27   Modified: 2012-02-12

Description:
Memory leak in Paul Rombouts pdnsd before 1.2.4 allows remote attackers to cause a denial of service (memory consumption) via a DNS query with an unsupported (1) QTYPE or (2) QCLASS, as demonstrated by the OUSPG PROTOS DNS test suite.

CVSS2 => (AV:N/AC:L/Au:N/C:N/I:N/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
5/10
2.9/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
None
None
Partial
Affected software
Pdnsd -> Pdnsd 

 References:
http://www.kb.cert.org/vuls/id/955777
http://www.securityfocus.com/bid/17694
http://securitytracker.com/id?1015989
http://www.vupen.com/english/advisories/2006/1528
http://www.vupen.com/english/advisories/2006/1505
http://www.phys.uu.nl/~rombouts/pdnsd.html
http://www.niscc.gov.uk/niscc/docs/re-20060425-00312.pdf?lang=en
http://www.niscc.gov.uk/niscc/docs/br-20060425-00311.html?lang=en
http://xforce.iss.net/xforce/xfdb/26081
http://www.gentoo.org/security/en/glsa/glsa-200605-10.xml
http://secunia.com/advisories/20055
http://secunia.com/advisories/19835

Copyright 2024, cxsecurity.com

 

Back to Top