All the vulnerabilites related to dnrd - dnrd
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:dnrd:dnrd:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "8F7EA693-9873-4201-B66D-D0AC08E7F560", "vulnerable": true }, { "criteria": "cpe:2.3:a:dnrd:dnrd:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "022F8E8E-F6A1-4782-82D0-686E6FADCF44", "vulnerable": true }, { "criteria": "cpe:2.3:a:dnrd:dnrd:1.2:*:*:*:*:*:*:*", "matchCriteriaId": "A9E269F0-8CFD-45DB-AF82-F9F57EDD0D1B", "vulnerable": true }, { "criteria": "cpe:2.3:a:dnrd:dnrd:1.3:*:*:*:*:*:*:*", "matchCriteriaId": "752CC26D-33D2-43F1-A43B-E101553895C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:dnrd:dnrd:1.4:*:*:*:*:*:*:*", "matchCriteriaId": "317134CF-981A-44CC-B068-BA762AED5EB6", "vulnerable": true }, { "criteria": "cpe:2.3:a:dnrd:dnrd:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "20BAB657-CAB8-4473-9EE5-5F725F2EB1E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:dnrd:dnrd:2.1:*:*:*:*:*:*:*", "matchCriteriaId": "84D1387B-91E2-4AC8-B387-B50F4D7DFDC5", "vulnerable": true }, { "criteria": "cpe:2.3:a:dnrd:dnrd:2.2:*:*:*:*:*:*:*", "matchCriteriaId": "19028501-E538-4F36-8DF7-3D2A76D86895", "vulnerable": true }, { "criteria": "cpe:2.3:a:dnrd:dnrd:2.3:*:*:*:*:*:*:*", "matchCriteriaId": "F7173317-9F5E-4F80-A957-02084B8DC8C2", "vulnerable": true }, { "criteria": "cpe:2.3:a:dnrd:dnrd:2.4:*:*:*:*:*:*:*", "matchCriteriaId": "297935D9-E108-4DB1-B4C8-2AC43DB6EA04", "vulnerable": true }, { "criteria": "cpe:2.3:a:dnrd:dnrd:2.5:*:*:*:*:*:*:*", "matchCriteriaId": "770BBF88-63D2-4AD6-B28F-5664DFFD746E", "vulnerable": true }, { "criteria": "cpe:2.3:a:dnrd:dnrd:2.6:*:*:*:*:*:*:*", "matchCriteriaId": "45B16588-35CA-4640-8FA8-BC63D91C7416", "vulnerable": true }, { "criteria": "cpe:2.3:a:dnrd:dnrd:2.7:*:*:*:*:*:*:*", "matchCriteriaId": "8FA35F28-CAA5-4C03-ABB8-4647537CC8E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:dnrd:dnrd:2.8:*:*:*:*:*:*:*", "matchCriteriaId": "9DAC824F-2031-4427-BF38-C32A7644D2B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:dnrd:dnrd:2.9:*:*:*:*:*:*:*", "matchCriteriaId": "7884CCA6-2031-41DB-860D-AF18047AF617", "vulnerable": true }, { "criteria": "cpe:2.3:a:dnrd:dnrd:2.10:*:*:*:*:*:*:*", "matchCriteriaId": "A906D87C-5557-4FC0-BBF3-7169EF35DEAE", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer overflow in Domain Name Relay Daemon (DNRD) before 2.19.1 allows remote attackers to execute arbitrary code via a large number of large DNS packets with the Z and QR flags cleared." } ], "evaluatorSolution": "This vulnerability is addressed in the following product release:\r\ndnrd, dnrd, 2.19.1\r\nThis vulnerability affects all versions of dnrd prior to 2.19.1", "id": "CVE-2005-2315", "lastModified": "2024-11-20T23:59:17.217", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2005-12-31T05:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/16142" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://securitytracker.com/id?1014557" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://sourceforge.net/forum/forum.php?forum_id=482568" }, { "source": "cve@mitre.org", "url": "http://www.FreeBSD.org/ports/portaudit/e72fd82b-fa01-11d9-bc08-0001020eed82.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/16142" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://securitytracker.com/id?1014557" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://sourceforge.net/forum/forum.php?forum_id=482568" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.FreeBSD.org/ports/portaudit/e72fd82b-fa01-11d9-bc08-0001020eed82.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
dnrd | dnrd | 2.0 | |
dnrd | dnrd | 2.1 | |
dnrd | dnrd | 2.2 | |
dnrd | dnrd | 2.3 | |
dnrd | dnrd | 2.4 | |
dnrd | dnrd | 2.5 | |
dnrd | dnrd | 2.6 | |
dnrd | dnrd | 2.7 | |
dnrd | dnrd | 2.8 | |
dnrd | dnrd | 2.9 | |
dnrd | dnrd | 2.10 | |
dnrd | dnrd | 2.11 | |
dnrd | dnrd | 2.12 | |
dnrd | dnrd | 2.12.1 | |
dnrd | dnrd | 2.13 | |
dnrd | dnrd | 2.14 | |
dnrd | dnrd | 2.14.1 | |
dnrd | dnrd | 2.15 | |
dnrd | dnrd | 2.16 | |
dnrd | dnrd | 2.16.1 | |
dnrd | dnrd | 2.17.1 | |
dnrd | dnrd | 2.17.2 | |
dnrd | dnrd | 2.18 | |
dnrd | dnrd | 2.19 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:dnrd:dnrd:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "20BAB657-CAB8-4473-9EE5-5F725F2EB1E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:dnrd:dnrd:2.1:*:*:*:*:*:*:*", "matchCriteriaId": "84D1387B-91E2-4AC8-B387-B50F4D7DFDC5", "vulnerable": true }, { "criteria": "cpe:2.3:a:dnrd:dnrd:2.2:*:*:*:*:*:*:*", "matchCriteriaId": "19028501-E538-4F36-8DF7-3D2A76D86895", "vulnerable": true }, { "criteria": "cpe:2.3:a:dnrd:dnrd:2.3:*:*:*:*:*:*:*", "matchCriteriaId": "F7173317-9F5E-4F80-A957-02084B8DC8C2", "vulnerable": true }, { "criteria": "cpe:2.3:a:dnrd:dnrd:2.4:*:*:*:*:*:*:*", "matchCriteriaId": "297935D9-E108-4DB1-B4C8-2AC43DB6EA04", "vulnerable": true }, { "criteria": "cpe:2.3:a:dnrd:dnrd:2.5:*:*:*:*:*:*:*", "matchCriteriaId": "770BBF88-63D2-4AD6-B28F-5664DFFD746E", "vulnerable": true }, { "criteria": "cpe:2.3:a:dnrd:dnrd:2.6:*:*:*:*:*:*:*", "matchCriteriaId": "45B16588-35CA-4640-8FA8-BC63D91C7416", "vulnerable": true }, { "criteria": "cpe:2.3:a:dnrd:dnrd:2.7:*:*:*:*:*:*:*", "matchCriteriaId": "8FA35F28-CAA5-4C03-ABB8-4647537CC8E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:dnrd:dnrd:2.8:*:*:*:*:*:*:*", "matchCriteriaId": "9DAC824F-2031-4427-BF38-C32A7644D2B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:dnrd:dnrd:2.9:*:*:*:*:*:*:*", "matchCriteriaId": "7884CCA6-2031-41DB-860D-AF18047AF617", "vulnerable": true }, { "criteria": "cpe:2.3:a:dnrd:dnrd:2.10:*:*:*:*:*:*:*", "matchCriteriaId": "A906D87C-5557-4FC0-BBF3-7169EF35DEAE", "vulnerable": true }, { "criteria": "cpe:2.3:a:dnrd:dnrd:2.11:*:*:*:*:*:*:*", "matchCriteriaId": "9ABE899F-8C96-4C64-8916-902846DFBFB2", "vulnerable": true }, { "criteria": "cpe:2.3:a:dnrd:dnrd:2.12:*:*:*:*:*:*:*", "matchCriteriaId": "115CFC38-1CDB-456E-AC0A-FF02D50A6BCD", "vulnerable": true }, { "criteria": "cpe:2.3:a:dnrd:dnrd:2.12.1:*:*:*:*:*:*:*", "matchCriteriaId": "C237BF63-7580-47D3-A6ED-F20A040E132B", "vulnerable": true }, { "criteria": "cpe:2.3:a:dnrd:dnrd:2.13:*:*:*:*:*:*:*", "matchCriteriaId": "94D93AD9-D6FF-42F9-82E3-76D4FAC077A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:dnrd:dnrd:2.14:*:*:*:*:*:*:*", "matchCriteriaId": "78082473-E735-4879-9200-0EF501C4BBD8", "vulnerable": true }, { "criteria": "cpe:2.3:a:dnrd:dnrd:2.14.1:*:*:*:*:*:*:*", "matchCriteriaId": "A94B9867-D6DB-4CD1-9E87-7FBA6CABED61", "vulnerable": true }, { "criteria": "cpe:2.3:a:dnrd:dnrd:2.15:*:*:*:*:*:*:*", "matchCriteriaId": "248AB0D6-21FD-463F-BA22-CAD623D81D4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:dnrd:dnrd:2.16:*:*:*:*:*:*:*", "matchCriteriaId": "9FA3413D-333E-418C-A715-50D05B1FB148", "vulnerable": true }, { "criteria": "cpe:2.3:a:dnrd:dnrd:2.16.1:*:*:*:*:*:*:*", "matchCriteriaId": "B4F1C429-978E-4A8E-8356-0AF790D2F487", "vulnerable": true }, { "criteria": "cpe:2.3:a:dnrd:dnrd:2.17.1:*:*:*:*:*:*:*", "matchCriteriaId": "E3BE4CA9-79C9-4220-BAC3-9267AA0018BF", "vulnerable": true }, { "criteria": "cpe:2.3:a:dnrd:dnrd:2.17.2:*:*:*:*:*:*:*", "matchCriteriaId": "2585141E-AB34-4D8B-B0DC-B5E38C4B0ED8", "vulnerable": true }, { "criteria": "cpe:2.3:a:dnrd:dnrd:2.18:*:*:*:*:*:*:*", "matchCriteriaId": "3E910C79-9F6A-4C39-BCCD-116EC2941DAE", "vulnerable": true }, { "criteria": "cpe:2.3:a:dnrd:dnrd:2.19:*:*:*:*:*:*:*", "matchCriteriaId": "94CBFC5B-3F05-4030-880E-3F7060ED1A52", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Domain Name Relay Daemon (DNRD) before 2.19.1 allows remote attackers to cause a denial of service (infinite recursion) via a DNS packet that uses message compression in the QNAME and two pointers that point to each other (circular buffer)." } ], "id": "CVE-2005-2316", "lastModified": "2024-11-20T23:59:17.357", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2005-12-31T05:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/16142" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1014557" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://sourceforge.net/forum/forum.php?forum_id=482568" }, { "source": "cve@mitre.org", "url": "http://www.FreeBSD.org/ports/portaudit/e72fd82b-fa01-11d9-bc08-0001020eed82.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/16142" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1014557" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://sourceforge.net/forum/forum.php?forum_id=482568" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.FreeBSD.org/ports/portaudit/e72fd82b-fa01-11d9-bc08-0001020eed82.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:dnrd:dnrd:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "8F7EA693-9873-4201-B66D-D0AC08E7F560", "vulnerable": true }, { "criteria": "cpe:2.3:a:dnrd:dnrd:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "022F8E8E-F6A1-4782-82D0-686E6FADCF44", "vulnerable": true }, { "criteria": "cpe:2.3:a:dnrd:dnrd:1.2:*:*:*:*:*:*:*", "matchCriteriaId": "A9E269F0-8CFD-45DB-AF82-F9F57EDD0D1B", "vulnerable": true }, { "criteria": "cpe:2.3:a:dnrd:dnrd:1.3:*:*:*:*:*:*:*", "matchCriteriaId": "752CC26D-33D2-43F1-A43B-E101553895C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:dnrd:dnrd:1.4:*:*:*:*:*:*:*", "matchCriteriaId": "317134CF-981A-44CC-B068-BA762AED5EB6", "vulnerable": true }, { "criteria": "cpe:2.3:a:dnrd:dnrd:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "20BAB657-CAB8-4473-9EE5-5F725F2EB1E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:dnrd:dnrd:2.1:*:*:*:*:*:*:*", "matchCriteriaId": "84D1387B-91E2-4AC8-B387-B50F4D7DFDC5", "vulnerable": true }, { "criteria": "cpe:2.3:a:dnrd:dnrd:2.2:*:*:*:*:*:*:*", "matchCriteriaId": "19028501-E538-4F36-8DF7-3D2A76D86895", "vulnerable": true }, { "criteria": "cpe:2.3:a:dnrd:dnrd:2.3:*:*:*:*:*:*:*", "matchCriteriaId": "F7173317-9F5E-4F80-A957-02084B8DC8C2", "vulnerable": true }, { "criteria": "cpe:2.3:a:dnrd:dnrd:2.4:*:*:*:*:*:*:*", "matchCriteriaId": "297935D9-E108-4DB1-B4C8-2AC43DB6EA04", "vulnerable": true }, { "criteria": "cpe:2.3:a:dnrd:dnrd:2.5:*:*:*:*:*:*:*", "matchCriteriaId": "770BBF88-63D2-4AD6-B28F-5664DFFD746E", "vulnerable": true }, { "criteria": "cpe:2.3:a:dnrd:dnrd:2.6:*:*:*:*:*:*:*", "matchCriteriaId": "45B16588-35CA-4640-8FA8-BC63D91C7416", "vulnerable": true }, { "criteria": "cpe:2.3:a:dnrd:dnrd:2.7:*:*:*:*:*:*:*", "matchCriteriaId": "8FA35F28-CAA5-4C03-ABB8-4647537CC8E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:dnrd:dnrd:2.8:*:*:*:*:*:*:*", "matchCriteriaId": "9DAC824F-2031-4427-BF38-C32A7644D2B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:dnrd:dnrd:2.9:*:*:*:*:*:*:*", "matchCriteriaId": "7884CCA6-2031-41DB-860D-AF18047AF617", "vulnerable": true }, { "criteria": "cpe:2.3:a:dnrd:dnrd:2.10:*:*:*:*:*:*:*", "matchCriteriaId": "A906D87C-5557-4FC0-BBF3-7169EF35DEAE", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Domain Name Relay Daemon (dnrd) 2.10 and earlier allows remote malicious DNS sites to cause a denial of service and possibly execute arbitrary code via a long or malformed DNS reply, which is not handled properly by parse_query, get_objectname, and possibly other functions." }, { "lang": "es", "value": "Domain Name Relay Daemon (dnrd) 2.10 y versiones anteriores permiten a sitios maliciosos DNS remotos causar denegaci\u00f3n de servicio y quiz\u00e1 la ejecuci\u00f3n de c\u00f3digo arbitrario mediante una r\u00e9plica larga o defectuosa del DNS, el cual no es manejada adecuadamente por las funciones \u0027parse_query\u0027, \u0027get_objectname\u0027 y posiblemente otras." } ], "id": "CVE-2002-0140", "lastModified": "2024-11-20T23:38:24.320", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": true, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2002-03-25T05:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://online.securityfocus.com/archive/1/251619" }, { "source": "cve@mitre.org", "url": "http://www.iss.net/security_center/static/7957.php" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/3928" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://online.securityfocus.com/archive/1/251619" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.iss.net/security_center/static/7957.php" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/3928" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:dnrd:dnrd:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "8F7EA693-9873-4201-B66D-D0AC08E7F560", "vulnerable": true }, { "criteria": "cpe:2.3:a:dnrd:dnrd:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "022F8E8E-F6A1-4782-82D0-686E6FADCF44", "vulnerable": true }, { "criteria": "cpe:2.3:a:dnrd:dnrd:1.2:*:*:*:*:*:*:*", "matchCriteriaId": "A9E269F0-8CFD-45DB-AF82-F9F57EDD0D1B", "vulnerable": true }, { "criteria": "cpe:2.3:a:dnrd:dnrd:1.3:*:*:*:*:*:*:*", "matchCriteriaId": "752CC26D-33D2-43F1-A43B-E101553895C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:dnrd:dnrd:1.4:*:*:*:*:*:*:*", "matchCriteriaId": "317134CF-981A-44CC-B068-BA762AED5EB6", "vulnerable": true }, { "criteria": "cpe:2.3:a:dnrd:dnrd:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "20BAB657-CAB8-4473-9EE5-5F725F2EB1E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:dnrd:dnrd:2.1:*:*:*:*:*:*:*", "matchCriteriaId": "84D1387B-91E2-4AC8-B387-B50F4D7DFDC5", "vulnerable": true }, { "criteria": "cpe:2.3:a:dnrd:dnrd:2.2:*:*:*:*:*:*:*", "matchCriteriaId": "19028501-E538-4F36-8DF7-3D2A76D86895", "vulnerable": true }, { "criteria": "cpe:2.3:a:dnrd:dnrd:2.3:*:*:*:*:*:*:*", "matchCriteriaId": "F7173317-9F5E-4F80-A957-02084B8DC8C2", "vulnerable": true }, { "criteria": "cpe:2.3:a:dnrd:dnrd:2.4:*:*:*:*:*:*:*", "matchCriteriaId": "297935D9-E108-4DB1-B4C8-2AC43DB6EA04", "vulnerable": true }, { "criteria": "cpe:2.3:a:dnrd:dnrd:2.5:*:*:*:*:*:*:*", "matchCriteriaId": "770BBF88-63D2-4AD6-B28F-5664DFFD746E", "vulnerable": true }, { "criteria": "cpe:2.3:a:dnrd:dnrd:2.6:*:*:*:*:*:*:*", "matchCriteriaId": "45B16588-35CA-4640-8FA8-BC63D91C7416", "vulnerable": true }, { "criteria": "cpe:2.3:a:dnrd:dnrd:2.7:*:*:*:*:*:*:*", "matchCriteriaId": "8FA35F28-CAA5-4C03-ABB8-4647537CC8E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:dnrd:dnrd:2.8:*:*:*:*:*:*:*", "matchCriteriaId": "9DAC824F-2031-4427-BF38-C32A7644D2B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:dnrd:dnrd:2.9:*:*:*:*:*:*:*", "matchCriteriaId": "7884CCA6-2031-41DB-860D-AF18047AF617", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The DNS implementation of DNRD before 2.10 allows remote attackers to cause a denial of service via a compressed DNS packet with a label length byte with an incorrect offset, which could trigger an infinite loop." } ], "evaluatorSolution": "This vulnerability is addressed in the following product release:\r\ndnrd, dnrd, 2.10", "id": "CVE-2005-0037", "lastModified": "2024-11-20T23:54:16.360", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2005-12-31T05:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.niscc.gov.uk/niscc/docs/al-20050524-00433.html" }, { "source": "cve@mitre.org", "url": "http://www.niscc.gov.uk/niscc/docs/re-20050524-00432.pdf?lang=en" }, { "source": "cve@mitre.org", "url": "http://www.osvdb.org/25291" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/13729" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.niscc.gov.uk/niscc/docs/al-20050524-00433.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.niscc.gov.uk/niscc/docs/re-20050524-00432.pdf?lang=en" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/25291" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/13729" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:delegate:delegate:7.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "F9180C95-FF6F-4A0C-9DE0-DFF6D8387698", "vulnerable": true }, { "criteria": "cpe:2.3:a:delegate:delegate:7.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "68FA1404-9FA2-4379-96BC-6D7970C0EAA5", "vulnerable": true }, { "criteria": "cpe:2.3:a:delegate:delegate:7.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "EABEE7AB-7C45-473E-9873-0423F2249F96", "vulnerable": true }, { "criteria": "cpe:2.3:a:delegate:delegate:7.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "A1F66F57-6AEB-4E3C-B148-BC7D11E1EBEC", "vulnerable": true }, { "criteria": "cpe:2.3:a:delegate:delegate:7.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "611AD3E5-708F-46BB-B21D-09598E1C4771", "vulnerable": true }, { "criteria": "cpe:2.3:a:delegate:delegate:7.9.11:*:*:*:*:*:*:*", "matchCriteriaId": "AD59AEEB-D524-4337-8962-B29863CBC889", "vulnerable": true }, { "criteria": "cpe:2.3:a:delegate:delegate:8.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "F15245AF-B9B6-4D46-A901-A781FC0BAF24", "vulnerable": true }, { "criteria": "cpe:2.3:a:delegate:delegate:8.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "C7A3E1EB-89A5-4326-8977-9B462065C39B", "vulnerable": true }, { "criteria": "cpe:2.3:a:delegate:delegate:8.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "1BD607D2-2B07-474B-A855-2C3319B42CED", "vulnerable": true }, { "criteria": "cpe:2.3:a:delegate:delegate:8.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "BE4B4665-84C4-4129-9916-ABAC61B81FF5", "vulnerable": true }, { "criteria": "cpe:2.3:a:delegate:delegate:8.9:*:*:*:*:*:*:*", "matchCriteriaId": "4131A4A5-5D67-4522-9A6E-E708815B5B86", "vulnerable": true }, { "criteria": "cpe:2.3:a:delegate:delegate:8.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "F8C30DD0-C957-44BA-B44C-7B424E664B52", "vulnerable": true }, { "criteria": "cpe:2.3:a:delegate:delegate:8.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "EC2E24A5-A864-4F42-A053-2FDA9D09A4B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:delegate:delegate:8.9.3:*:*:*:*:*:*:*", "matchCriteriaId": "0993A56D-3A68-464A-B580-BE2EC3846F3E", "vulnerable": true }, { "criteria": "cpe:2.3:a:delegate:delegate:8.9.4:*:*:*:*:*:*:*", "matchCriteriaId": "1EF6186E-90D1-4D22-A469-0E955D5F1EF7", "vulnerable": true }, { "criteria": "cpe:2.3:a:delegate:delegate:8.9.5:*:*:*:*:*:*:*", "matchCriteriaId": "7323E750-C596-46FC-AA85-9271CC9C2CE7", "vulnerable": true }, { "criteria": "cpe:2.3:a:dnrd:dnrd:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "8F7EA693-9873-4201-B66D-D0AC08E7F560", "vulnerable": true }, { "criteria": "cpe:2.3:a:dnrd:dnrd:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "022F8E8E-F6A1-4782-82D0-686E6FADCF44", "vulnerable": true }, { "criteria": "cpe:2.3:a:dnrd:dnrd:1.2:*:*:*:*:*:*:*", "matchCriteriaId": "A9E269F0-8CFD-45DB-AF82-F9F57EDD0D1B", "vulnerable": true }, { "criteria": "cpe:2.3:a:dnrd:dnrd:1.3:*:*:*:*:*:*:*", "matchCriteriaId": "752CC26D-33D2-43F1-A43B-E101553895C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:dnrd:dnrd:1.4:*:*:*:*:*:*:*", "matchCriteriaId": "317134CF-981A-44CC-B068-BA762AED5EB6", "vulnerable": true }, { "criteria": "cpe:2.3:a:dnrd:dnrd:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "20BAB657-CAB8-4473-9EE5-5F725F2EB1E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:dnrd:dnrd:2.1:*:*:*:*:*:*:*", "matchCriteriaId": "84D1387B-91E2-4AC8-B387-B50F4D7DFDC5", "vulnerable": true }, { "criteria": "cpe:2.3:a:dnrd:dnrd:2.2:*:*:*:*:*:*:*", "matchCriteriaId": "19028501-E538-4F36-8DF7-3D2A76D86895", "vulnerable": true }, { "criteria": "cpe:2.3:a:dnrd:dnrd:2.3:*:*:*:*:*:*:*", "matchCriteriaId": "F7173317-9F5E-4F80-A957-02084B8DC8C2", "vulnerable": true }, { "criteria": "cpe:2.3:a:dnrd:dnrd:2.4:*:*:*:*:*:*:*", "matchCriteriaId": "297935D9-E108-4DB1-B4C8-2AC43DB6EA04", "vulnerable": true }, { "criteria": "cpe:2.3:a:dnrd:dnrd:2.5:*:*:*:*:*:*:*", "matchCriteriaId": "770BBF88-63D2-4AD6-B28F-5664DFFD746E", "vulnerable": true }, { "criteria": "cpe:2.3:a:dnrd:dnrd:2.6:*:*:*:*:*:*:*", "matchCriteriaId": "45B16588-35CA-4640-8FA8-BC63D91C7416", "vulnerable": true }, { "criteria": "cpe:2.3:a:dnrd:dnrd:2.7:*:*:*:*:*:*:*", "matchCriteriaId": "8FA35F28-CAA5-4C03-ABB8-4647537CC8E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:dnrd:dnrd:2.8:*:*:*:*:*:*:*", "matchCriteriaId": "9DAC824F-2031-4427-BF38-C32A7644D2B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:dnrd:dnrd:2.9:*:*:*:*:*:*:*", "matchCriteriaId": "7884CCA6-2031-41DB-860D-AF18047AF617", "vulnerable": true }, { "criteria": "cpe:2.3:a:dnrd:dnrd:2.10:*:*:*:*:*:*:*", "matchCriteriaId": "A906D87C-5557-4FC0-BBF3-7169EF35DEAE", "vulnerable": true }, { "criteria": "cpe:2.3:a:don_moore:mydns:0.6:*:*:*:*:*:*:*", "matchCriteriaId": "CC34DC23-117A-403E-9C87-79B1C512A5DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:don_moore:mydns:0.7:*:*:*:*:*:*:*", "matchCriteriaId": "BFE559DF-3874-42E7-BB5B-8968E52D7A04", "vulnerable": true }, { "criteria": "cpe:2.3:a:don_moore:mydns:0.8:*:*:*:*:*:*:*", "matchCriteriaId": "11068A01-20FB-4039-8919-85CF93F0FF2C", "vulnerable": true }, { "criteria": "cpe:2.3:a:don_moore:mydns:0.9:*:*:*:*:*:*:*", "matchCriteriaId": "9435E392-AE02-48A8-9A2D-3D1593DA3DC6", "vulnerable": true }, { "criteria": "cpe:2.3:a:don_moore:mydns:0.10.0:*:*:*:*:*:*:*", "matchCriteriaId": "D3B3D730-15C0-494A-A0B6-231C9F370A58", "vulnerable": true }, { "criteria": "cpe:2.3:a:maradns:maradns:0.5.28:*:*:*:*:*:*:*", "matchCriteriaId": "A917E7C9-BC1A-4D62-9A89-9D73A748D926", "vulnerable": true }, { "criteria": "cpe:2.3:a:maradns:maradns:0.5.29:*:*:*:*:*:*:*", "matchCriteriaId": "E0A01622-5254-4B3B-9412-771BE7400FA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:maradns:maradns:0.5.30:*:*:*:*:*:*:*", "matchCriteriaId": "2A3A5A98-3544-4A95-8436-0DF013B22CD7", "vulnerable": true }, { "criteria": "cpe:2.3:a:maradns:maradns:0.5.31:*:*:*:*:*:*:*", "matchCriteriaId": "BECF00EC-A188-4B7F-BA51-3AAC3B4195B4", "vulnerable": true }, { "criteria": "cpe:2.3:a:maradns:maradns:0.8.05:*:*:*:*:*:*:*", "matchCriteriaId": "AD2370B5-681D-469F-B07C-B9212A975C60", "vulnerable": true }, { "criteria": "cpe:2.3:a:pliant:pliant_dns_server:*:*:*:*:*:*:*:*", "matchCriteriaId": "FA13B142-71F9-475E-A28A-DDE94BE0E7FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:posadis:posadis:0.50.4:*:*:*:*:*:*:*", "matchCriteriaId": "1930E3DE-67BE-41F2-B8E3-BA8E18762C91", "vulnerable": true }, { "criteria": "cpe:2.3:a:posadis:posadis:0.50.5:*:*:*:*:*:*:*", "matchCriteriaId": "17C7DD08-C349-4687-8FAF-CCD211A9C166", "vulnerable": true }, { "criteria": "cpe:2.3:a:posadis:posadis:0.50.6:*:*:*:*:*:*:*", "matchCriteriaId": "981611C8-B957-428B-9500-37C60AE0E7E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:posadis:posadis:0.50.7:*:*:*:*:*:*:*", "matchCriteriaId": "D34782A9-4CCB-45AD-BA23-EE98EE218B3C", "vulnerable": true }, { "criteria": "cpe:2.3:a:posadis:posadis:0.50.8:*:*:*:*:*:*:*", "matchCriteriaId": "1A9D2517-4EAF-4DB9-B0EE-51F65671D45F", "vulnerable": true }, { "criteria": "cpe:2.3:a:posadis:posadis:0.50.9:*:*:*:*:*:*:*", "matchCriteriaId": "0FA40391-39D5-4CB7-BB8E-048C4ECBC3C2", "vulnerable": true }, { "criteria": "cpe:2.3:a:posadis:posadis:0.60.0:*:*:*:*:*:*:*", "matchCriteriaId": "135BFFE3-FF18-4462-9D19-2DF986E947DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:posadis:posadis:0.60.1:*:*:*:*:*:*:*", "matchCriteriaId": "DD907CE8-E0CD-46AA-A9E4-3D0FA3939DAB", "vulnerable": true }, { "criteria": "cpe:2.3:a:posadis:posadis:m5pre1:*:*:*:*:*:*:*", "matchCriteriaId": "530D1254-DC0A-4A7C-9520-D0F45B9AF278", "vulnerable": true }, { "criteria": "cpe:2.3:a:posadis:posadis:m5pre2:*:*:*:*:*:*:*", "matchCriteriaId": "5C3BF047-0339-4064-9B3B-68E96F1AB1B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:qbik:wingate:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "4C7BC4C8-FB7B-4A88-B97B-984D9AA8EA1D", "vulnerable": true }, { "criteria": "cpe:2.3:a:qbik:wingate:4.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "0C1D98E1-EBE1-4697-906F-E29C91D9074D", "vulnerable": true }, { "criteria": "cpe:2.3:a:qbik:wingate:4.1_beta_a:*:*:*:*:*:*:*", "matchCriteriaId": "8AB1D7C0-E484-4441-AA68-FBA5A3309547", "vulnerable": true }, { "criteria": "cpe:2.3:a:qbik:wingate:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "E3F0670C-C07E-4A84-952B-88200D2D9B14", "vulnerable": true }, { "criteria": "cpe:2.3:a:qbik:wingate:6.0.1_build_993:*:*:*:*:*:*:*", "matchCriteriaId": "82CD8E2B-37BF-4989-ABF3-9EC8E6F1C079", "vulnerable": true }, { "criteria": "cpe:2.3:a:qbik:wingate:6.0.1_build_995:*:*:*:*:*:*:*", "matchCriteriaId": "2CCFB397-9F5F-42F8-ABB3-9700F100D43D", "vulnerable": true }, { "criteria": "cpe:2.3:a:team_johnlong:raidendnsd:*:*:*:*:*:*:*:*", "matchCriteriaId": "F4967B8F-D25F-4B55-842E-0C7819EDA88A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:axis:2100_network_camera:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "37F0C4C8-E648-4486-BFE3-23333FCFF118", "vulnerable": true }, { "criteria": "cpe:2.3:h:axis:2100_network_camera:2.01:*:*:*:*:*:*:*", "matchCriteriaId": "56647964-82B3-4A7A-BE0D-C252654F8CBB", "vulnerable": true }, { "criteria": "cpe:2.3:h:axis:2100_network_camera:2.02:*:*:*:*:*:*:*", "matchCriteriaId": "C7B83A6F-1996-49B7-BA76-98B83548F289", "vulnerable": true }, { "criteria": "cpe:2.3:h:axis:2100_network_camera:2.03:*:*:*:*:*:*:*", "matchCriteriaId": "E021E51E-EA28-4E61-A08A-A590984A483E", "vulnerable": true }, { "criteria": "cpe:2.3:h:axis:2100_network_camera:2.12:*:*:*:*:*:*:*", "matchCriteriaId": "94ABCB8C-8EED-4635-BA54-735CA12A1F64", "vulnerable": true }, { "criteria": "cpe:2.3:h:axis:2100_network_camera:2.30:*:*:*:*:*:*:*", "matchCriteriaId": "38C70CE1-0116-4C91-AB59-0C0D9F17099B", "vulnerable": true }, { "criteria": "cpe:2.3:h:axis:2100_network_camera:2.31:*:*:*:*:*:*:*", "matchCriteriaId": "44B1C47A-938B-4F9B-B4B5-88B8622DC965", "vulnerable": true }, { "criteria": "cpe:2.3:h:axis:2100_network_camera:2.32:*:*:*:*:*:*:*", "matchCriteriaId": "E890E332-7A3B-4B6A-91B3-7FEFAF5DBA6E", "vulnerable": true }, { "criteria": "cpe:2.3:h:axis:2100_network_camera:2.33:*:*:*:*:*:*:*", "matchCriteriaId": "4830EAF7-9504-4090-8DDD-6CC6658ABFD4", "vulnerable": true }, { "criteria": "cpe:2.3:h:axis:2100_network_camera:2.34:*:*:*:*:*:*:*", "matchCriteriaId": "7E26AD96-7BA4-4722-B059-6444FFC2E6D3", "vulnerable": true }, { "criteria": "cpe:2.3:h:axis:2100_network_camera:2.40:*:*:*:*:*:*:*", "matchCriteriaId": "E06E7446-34EC-428A-82EE-2E24F2908C97", "vulnerable": true }, { "criteria": "cpe:2.3:h:axis:2100_network_camera:2.41:*:*:*:*:*:*:*", "matchCriteriaId": "8D4996E0-097B-4B79-8A1C-CE55F94B8D29", "vulnerable": true }, { "criteria": "cpe:2.3:h:axis:2110_network_camera:2.12:*:*:*:*:*:*:*", "matchCriteriaId": "0200586F-7F71-47F6-8D2E-F06E1BF418E7", "vulnerable": true }, { "criteria": "cpe:2.3:h:axis:2110_network_camera:2.30:*:*:*:*:*:*:*", "matchCriteriaId": "F5764F35-7F21-40D0-A3FF-8EEF97F7931D", "vulnerable": true }, { "criteria": "cpe:2.3:h:axis:2110_network_camera:2.31:*:*:*:*:*:*:*", "matchCriteriaId": "6BE3CF46-91CC-4AFD-B178-48AE90E0E339", "vulnerable": true }, { "criteria": "cpe:2.3:h:axis:2110_network_camera:2.32:*:*:*:*:*:*:*", "matchCriteriaId": "D79A54BC-789D-4ED2-B3BC-C42959D7FFF7", "vulnerable": true }, { "criteria": "cpe:2.3:h:axis:2110_network_camera:2.34:*:*:*:*:*:*:*", "matchCriteriaId": "79A8A437-5AF7-448E-9AF8-D8FBA481CFE2", "vulnerable": true }, { "criteria": "cpe:2.3:h:axis:2110_network_camera:2.40:*:*:*:*:*:*:*", "matchCriteriaId": "5663D3D1-5962-4C43-B689-089EAFE25FD5", "vulnerable": true }, { "criteria": "cpe:2.3:h:axis:2110_network_camera:2.41:*:*:*:*:*:*:*", "matchCriteriaId": "34EDC537-0EFF-46EA-8368-A690480E5D6E", "vulnerable": true }, { "criteria": "cpe:2.3:h:axis:2120_network_camera:2.12:*:*:*:*:*:*:*", "matchCriteriaId": "39798220-4621-4C5D-B6A7-6639D02E0C07", "vulnerable": true }, { "criteria": "cpe:2.3:h:axis:2120_network_camera:2.30:*:*:*:*:*:*:*", "matchCriteriaId": "05EF66A4-F7BB-40C3-9CBF-5DB8715780C9", "vulnerable": true }, { "criteria": "cpe:2.3:h:axis:2120_network_camera:2.31:*:*:*:*:*:*:*", "matchCriteriaId": "9DCA7249-7F8F-4A2D-B98F-6AA0ECF17D7F", "vulnerable": true }, { "criteria": "cpe:2.3:h:axis:2120_network_camera:2.32:*:*:*:*:*:*:*", "matchCriteriaId": "0E942419-3272-4267-AF23-4B6071D71277", "vulnerable": true }, { "criteria": "cpe:2.3:h:axis:2120_network_camera:2.34:*:*:*:*:*:*:*", "matchCriteriaId": "3848A541-4F14-4E3B-99EE-B7C5A886C541", "vulnerable": true }, { "criteria": "cpe:2.3:h:axis:2120_network_camera:2.40:*:*:*:*:*:*:*", "matchCriteriaId": "34E980E1-62B8-4E37-AE9D-DFE033053620", "vulnerable": true }, { "criteria": "cpe:2.3:h:axis:2120_network_camera:2.41:*:*:*:*:*:*:*", "matchCriteriaId": "730E6E09-C0C8-4F8A-BE07-BFED00FC1235", "vulnerable": true }, { "criteria": "cpe:2.3:h:axis:2400_video_server:3.11:*:*:*:*:*:*:*", "matchCriteriaId": "81100E37-1B99-4317-829F-B4A2278FA323", "vulnerable": true }, { "criteria": "cpe:2.3:h:axis:2400_video_server:3.12:*:*:*:*:*:*:*", "matchCriteriaId": "10321B16-1675-4609-8267-3971A9062AF0", "vulnerable": true }, { "criteria": "cpe:2.3:h:axis:2401_video_server:3.12:*:*:*:*:*:*:*", "matchCriteriaId": "35F0E1BA-D05F-41CB-ACD9-035A6DF4735E", "vulnerable": true }, { "criteria": "cpe:2.3:h:axis:2420_network_camera:2.12:*:*:*:*:*:*:*", "matchCriteriaId": "1DD73320-38DA-4606-9CEA-F0C9D5A3215F", "vulnerable": true }, { "criteria": "cpe:2.3:h:axis:2420_network_camera:2.30:*:*:*:*:*:*:*", "matchCriteriaId": "B8374F1E-06BC-4A9E-8666-336AACC1F5BB", "vulnerable": true }, { "criteria": "cpe:2.3:h:axis:2420_network_camera:2.31:*:*:*:*:*:*:*", "matchCriteriaId": "DAA3F905-8AC0-42A3-AC63-BA61AE6619AE", "vulnerable": true }, { "criteria": "cpe:2.3:h:axis:2420_network_camera:2.32:*:*:*:*:*:*:*", "matchCriteriaId": "46E11270-65DE-4C07-A103-66217691069E", "vulnerable": true }, { "criteria": "cpe:2.3:h:axis:2420_network_camera:2.33:*:*:*:*:*:*:*", "matchCriteriaId": "7B93D2AD-FA36-4A6C-AC52-6FD0F3AE6A80", "vulnerable": true }, { "criteria": "cpe:2.3:h:axis:2420_network_camera:2.34:*:*:*:*:*:*:*", "matchCriteriaId": "D109CF38-0F5F-4A20-8A4A-DBE14D7826CD", "vulnerable": true }, { "criteria": "cpe:2.3:h:axis:2420_network_camera:2.40:*:*:*:*:*:*:*", "matchCriteriaId": "EA6E6FEA-9D2E-4ACD-8C3A-98DA4EB1C994", "vulnerable": true }, { "criteria": "cpe:2.3:h:axis:2420_network_camera:2.41:*:*:*:*:*:*:*", "matchCriteriaId": "10B4A828-33F4-4FB7-9637-3C761A73AEF9", "vulnerable": true }, { "criteria": "cpe:2.3:h:axis:2460_network_dvr:3.12:*:*:*:*:*:*:*", "matchCriteriaId": "41CB517F-BDC9-40D0-AB0D-2DFC7669E8F0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple implementations of the DNS protocol, including (1) Poslib 1.0.2-1 and earlier as used by Posadis, (2) Axis Network products before firmware 3.13, and (3) Men \u0026 Mice Suite 2.2x before 2.2.3 and 3.5.x before 3.5.2, allow remote attackers to cause a denial of service (CPU and network bandwidth consumption) by triggering a communications loop via (a) DNS query packets with localhost as a spoofed source address, or (b) a response packet that triggers a response packet." } ], "id": "CVE-2004-0789", "lastModified": "2024-11-20T23:49:24.677", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2004-12-31T05:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://secunia.com/advisories/13145" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://securitytracker.com/id?1012157" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.niscc.gov.uk/niscc/docs/al-20041130-00862.html?lang=en" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.niscc.gov.uk/niscc/docs/re-20041109-00957.pdf" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.posadis.org/advisories/pos_adv_006.txt" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/11642" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17997" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://secunia.com/advisories/13145" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://securitytracker.com/id?1012157" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.niscc.gov.uk/niscc/docs/al-20041130-00862.html?lang=en" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.niscc.gov.uk/niscc/docs/re-20041109-00957.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.posadis.org/advisories/pos_adv_006.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/11642" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17997" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
cve-2005-2316
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://securitytracker.com/id?1014557 | vdb-entry, x_refsource_SECTRACK | |
http://secunia.com/advisories/16142 | third-party-advisory, x_refsource_SECUNIA | |
http://www.FreeBSD.org/ports/portaudit/e72fd82b-fa01-11d9-bc08-0001020eed82.html | x_refsource_CONFIRM | |
http://sourceforge.net/forum/forum.php?forum_id=482568 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T22:22:49.059Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1014557", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1014557" }, { "name": "16142", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/16142" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.FreeBSD.org/ports/portaudit/e72fd82b-fa01-11d9-bc08-0001020eed82.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://sourceforge.net/forum/forum.php?forum_id=482568" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Domain Name Relay Daemon (DNRD) before 2.19.1 allows remote attackers to cause a denial of service (infinite recursion) via a DNS packet that uses message compression in the QNAME and two pointers that point to each other (circular buffer)." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2006-04-28T10:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "1014557", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1014557" }, { "name": "16142", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/16142" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.FreeBSD.org/ports/portaudit/e72fd82b-fa01-11d9-bc08-0001020eed82.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://sourceforge.net/forum/forum.php?forum_id=482568" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2005-2316", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Domain Name Relay Daemon (DNRD) before 2.19.1 allows remote attackers to cause a denial of service (infinite recursion) via a DNS packet that uses message compression in the QNAME and two pointers that point to each other (circular buffer)." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1014557", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1014557" }, { "name": "16142", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/16142" }, { "name": "http://www.FreeBSD.org/ports/portaudit/e72fd82b-fa01-11d9-bc08-0001020eed82.html", "refsource": "CONFIRM", "url": "http://www.FreeBSD.org/ports/portaudit/e72fd82b-fa01-11d9-bc08-0001020eed82.html" }, { "name": "http://sourceforge.net/forum/forum.php?forum_id=482568", "refsource": "CONFIRM", "url": "http://sourceforge.net/forum/forum.php?forum_id=482568" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2005-2316", "datePublished": "2006-04-28T10:00:00Z", "dateReserved": "2005-07-19T00:00:00Z", "dateUpdated": "2024-09-17T01:46:21.130Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2005-0037
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/13729 | vdb-entry, x_refsource_BID | |
http://www.niscc.gov.uk/niscc/docs/re-20050524-00432.pdf?lang=en | x_refsource_MISC | |
http://www.osvdb.org/25291 | vdb-entry, x_refsource_OSVDB | |
http://www.niscc.gov.uk/niscc/docs/al-20050524-00433.html | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T20:57:41.108Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "13729", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/13729" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.niscc.gov.uk/niscc/docs/re-20050524-00432.pdf?lang=en" }, { "name": "25291", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/25291" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.niscc.gov.uk/niscc/docs/al-20050524-00433.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2005-05-24T00:00:00", "descriptions": [ { "lang": "en", "value": "The DNS implementation of DNRD before 2.10 allows remote attackers to cause a denial of service via a compressed DNS packet with a label length byte with an incorrect offset, which could trigger an infinite loop." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2006-06-05T09:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "13729", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/13729" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.niscc.gov.uk/niscc/docs/re-20050524-00432.pdf?lang=en" }, { "name": "25291", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/25291" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.niscc.gov.uk/niscc/docs/al-20050524-00433.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2005-0037", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The DNS implementation of DNRD before 2.10 allows remote attackers to cause a denial of service via a compressed DNS packet with a label length byte with an incorrect offset, which could trigger an infinite loop." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "13729", "refsource": "BID", "url": "http://www.securityfocus.com/bid/13729" }, { "name": "http://www.niscc.gov.uk/niscc/docs/re-20050524-00432.pdf?lang=en", "refsource": "MISC", "url": "http://www.niscc.gov.uk/niscc/docs/re-20050524-00432.pdf?lang=en" }, { "name": "25291", "refsource": "OSVDB", "url": "http://www.osvdb.org/25291" }, { "name": "http://www.niscc.gov.uk/niscc/docs/al-20050524-00433.html", "refsource": "MISC", "url": "http://www.niscc.gov.uk/niscc/docs/al-20050524-00433.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2005-0037", "datePublished": "2006-04-28T01:00:00", "dateReserved": "2005-01-07T00:00:00", "dateUpdated": "2024-08-07T20:57:41.108Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2005-2315
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://securitytracker.com/id?1014557 | vdb-entry, x_refsource_SECTRACK | |
http://secunia.com/advisories/16142 | third-party-advisory, x_refsource_SECUNIA | |
http://www.FreeBSD.org/ports/portaudit/e72fd82b-fa01-11d9-bc08-0001020eed82.html | x_refsource_CONFIRM | |
http://sourceforge.net/forum/forum.php?forum_id=482568 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T22:22:49.044Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1014557", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1014557" }, { "name": "16142", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/16142" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.FreeBSD.org/ports/portaudit/e72fd82b-fa01-11d9-bc08-0001020eed82.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://sourceforge.net/forum/forum.php?forum_id=482568" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2005-07-21T00:00:00", "descriptions": [ { "lang": "en", "value": "Buffer overflow in Domain Name Relay Daemon (DNRD) before 2.19.1 allows remote attackers to execute arbitrary code via a large number of large DNS packets with the Z and QR flags cleared." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-06-15T16:41:18", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "1014557", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1014557" }, { "name": "16142", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/16142" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.FreeBSD.org/ports/portaudit/e72fd82b-fa01-11d9-bc08-0001020eed82.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://sourceforge.net/forum/forum.php?forum_id=482568" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2005-2315", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Buffer overflow in Domain Name Relay Daemon (DNRD) before 2.19.1 allows remote attackers to execute arbitrary code via a large number of large DNS packets with the Z and QR flags cleared." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1014557", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1014557" }, { "name": "16142", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/16142" }, { "name": "http://www.FreeBSD.org/ports/portaudit/e72fd82b-fa01-11d9-bc08-0001020eed82.html", "refsource": "CONFIRM", "url": "http://www.FreeBSD.org/ports/portaudit/e72fd82b-fa01-11d9-bc08-0001020eed82.html" }, { "name": "http://sourceforge.net/forum/forum.php?forum_id=482568", "refsource": "CONFIRM", "url": "http://sourceforge.net/forum/forum.php?forum_id=482568" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2005-2315", "datePublished": "2006-04-28T10:00:00", "dateReserved": "2005-07-19T00:00:00", "dateUpdated": "2024-08-07T22:22:49.044Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2004-0789
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://secunia.com/advisories/13145 | third-party-advisory, x_refsource_SECUNIA | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/17997 | vdb-entry, x_refsource_XF | |
http://securitytracker.com/id?1012157 | vdb-entry, x_refsource_SECTRACK | |
http://www.securityfocus.com/bid/11642 | vdb-entry, x_refsource_BID | |
http://www.niscc.gov.uk/niscc/docs/al-20041130-00862.html?lang=en | x_refsource_MISC | |
http://www.posadis.org/advisories/pos_adv_006.txt | x_refsource_CONFIRM | |
http://www.niscc.gov.uk/niscc/docs/re-20041109-00957.pdf | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T00:31:46.847Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "13145", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/13145" }, { "name": "dns-localhost-dos(17997)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17997" }, { "name": "1012157", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1012157" }, { "name": "11642", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/11642" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.niscc.gov.uk/niscc/docs/al-20041130-00862.html?lang=en" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.posadis.org/advisories/pos_adv_006.txt" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.niscc.gov.uk/niscc/docs/re-20041109-00957.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2004-11-30T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple implementations of the DNS protocol, including (1) Poslib 1.0.2-1 and earlier as used by Posadis, (2) Axis Network products before firmware 3.13, and (3) Men \u0026 Mice Suite 2.2x before 2.2.3 and 3.5.x before 3.5.2, allow remote attackers to cause a denial of service (CPU and network bandwidth consumption) by triggering a communications loop via (a) DNS query packets with localhost as a spoofed source address, or (b) a response packet that triggers a response packet." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-10T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "13145", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/13145" }, { "name": "dns-localhost-dos(17997)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17997" }, { "name": "1012157", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1012157" }, { "name": "11642", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/11642" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.niscc.gov.uk/niscc/docs/al-20041130-00862.html?lang=en" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.posadis.org/advisories/pos_adv_006.txt" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.niscc.gov.uk/niscc/docs/re-20041109-00957.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2004-0789", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple implementations of the DNS protocol, including (1) Poslib 1.0.2-1 and earlier as used by Posadis, (2) Axis Network products before firmware 3.13, and (3) Men \u0026 Mice Suite 2.2x before 2.2.3 and 3.5.x before 3.5.2, allow remote attackers to cause a denial of service (CPU and network bandwidth consumption) by triggering a communications loop via (a) DNS query packets with localhost as a spoofed source address, or (b) a response packet that triggers a response packet." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "13145", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/13145" }, { "name": "dns-localhost-dos(17997)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17997" }, { "name": "1012157", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1012157" }, { "name": "11642", "refsource": "BID", "url": "http://www.securityfocus.com/bid/11642" }, { "name": "http://www.niscc.gov.uk/niscc/docs/al-20041130-00862.html?lang=en", "refsource": "MISC", "url": "http://www.niscc.gov.uk/niscc/docs/al-20041130-00862.html?lang=en" }, { "name": "http://www.posadis.org/advisories/pos_adv_006.txt", "refsource": "CONFIRM", "url": "http://www.posadis.org/advisories/pos_adv_006.txt" }, { "name": "http://www.niscc.gov.uk/niscc/docs/re-20041109-00957.pdf", "refsource": "MISC", "url": "http://www.niscc.gov.uk/niscc/docs/re-20041109-00957.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2004-0789", "datePublished": "2005-09-01T04:00:00", "dateReserved": "2004-08-17T00:00:00", "dateUpdated": "2024-08-08T00:31:46.847Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2002-0140
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.iss.net/security_center/static/7957.php | vdb-entry, x_refsource_XF | |
http://www.securityfocus.com/bid/3928 | vdb-entry, x_refsource_BID | |
http://online.securityfocus.com/archive/1/251619 | mailing-list, x_refsource_BUGTRAQ |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T02:42:27.718Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "dnrd-dns-dos(7957)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "http://www.iss.net/security_center/static/7957.php" }, { "name": "3928", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/3928" }, { "name": "20020120 dnrd 2.10 dos", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://online.securityfocus.com/archive/1/251619" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2002-01-20T00:00:00", "descriptions": [ { "lang": "en", "value": "Domain Name Relay Daemon (dnrd) 2.10 and earlier allows remote malicious DNS sites to cause a denial of service and possibly execute arbitrary code via a long or malformed DNS reply, which is not handled properly by parse_query, get_objectname, and possibly other functions." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2005-07-07T00:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "dnrd-dns-dos(7957)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "http://www.iss.net/security_center/static/7957.php" }, { "name": "3928", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/3928" }, { "name": "20020120 dnrd 2.10 dos", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://online.securityfocus.com/archive/1/251619" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2002-0140", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Domain Name Relay Daemon (dnrd) 2.10 and earlier allows remote malicious DNS sites to cause a denial of service and possibly execute arbitrary code via a long or malformed DNS reply, which is not handled properly by parse_query, get_objectname, and possibly other functions." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "dnrd-dns-dos(7957)", "refsource": "XF", "url": "http://www.iss.net/security_center/static/7957.php" }, { "name": "3928", "refsource": "BID", "url": "http://www.securityfocus.com/bid/3928" }, { "name": "20020120 dnrd 2.10 dos", "refsource": "BUGTRAQ", "url": "http://online.securityfocus.com/archive/1/251619" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2002-0140", "datePublished": "2002-03-15T05:00:00", "dateReserved": "2002-03-15T00:00:00", "dateUpdated": "2024-08-08T02:42:27.718Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
var-200412-0018
Vulnerability from variot
Multiple implementations of the DNS protocol, including (1) Poslib 1.0.2-1 and earlier as used by Posadis, (2) Axis Network products before firmware 3.13, and (3) Men & Mice Suite 2.2x before 2.2.3 and 3.5.x before 3.5.2, allow remote attackers to cause a denial of service (CPU and network bandwidth consumption) by triggering a communications loop via (a) DNS query packets with localhost as a spoofed source address, or (b) a response packet that triggers a response packet. [CERT/CC VU#887766 See also ] DNS A vulnerability in the protocol implementation has been identified. Depending on the implementation, between servers Query - response A storm may occur. Also, localhost UDP 53 Port is From If a query with is sent, the server may continue to respond to the server itself and resources may be exhausted.Denial of service (denial-of-service, DoS) You can be attacked. Multiple DNS vendors are reported susceptible to a denial of service vulnerability
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200412-0018", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "delegate", "scope": "eq", "trust": 1.9, "vendor": "delegate", "version": "8.9.5" }, { "model": "wingate", "scope": "eq", "trust": 1.3, "vendor": "qbik", "version": "4.0.1" }, { "model": "wingate", "scope": "eq", "trust": 1.3, "vendor": "qbik", "version": "3.0" }, { "model": "posadis", "scope": "eq", "trust": 1.3, "vendor": "posadis", "version": "0.60.1" }, { "model": "posadis", "scope": "eq", "trust": 1.3, "vendor": "posadis", "version": "0.60.0" }, { "model": "posadis", "scope": "eq", "trust": 1.3, "vendor": "posadis", "version": "0.50.9" }, { "model": "posadis", "scope": "eq", "trust": 1.3, "vendor": "posadis", "version": "0.50.8" }, { "model": "posadis", "scope": "eq", "trust": 1.3, "vendor": "posadis", "version": "0.50.7" }, { "model": "posadis", "scope": "eq", "trust": 1.3, "vendor": "posadis", "version": "0.50.6" }, { "model": "posadis", "scope": "eq", "trust": 1.3, "vendor": "posadis", "version": "0.50.5" }, { "model": "posadis", "scope": "eq", "trust": 1.3, "vendor": "posadis", "version": "0.50.4" }, { "model": "maradns", "scope": "eq", "trust": 1.3, "vendor": "maradns", "version": "0.8.05" }, { "model": "maradns", "scope": "eq", "trust": 1.3, "vendor": "maradns", "version": "0.5.31" }, { "model": "maradns", "scope": "eq", "trust": 1.3, "vendor": "maradns", "version": "0.5.30" }, { "model": "maradns", "scope": "eq", "trust": 1.3, "vendor": "maradns", "version": "0.5.29" }, { "model": "maradns", "scope": "eq", "trust": 1.3, "vendor": "maradns", "version": "0.5.28" }, { "model": "dnrd", "scope": "eq", "trust": 1.3, "vendor": "dnrd", "version": "2.10" }, { "model": "dnrd", "scope": "eq", "trust": 1.3, "vendor": "dnrd", "version": "2.9" }, { "model": "dnrd", "scope": "eq", "trust": 1.3, "vendor": "dnrd", "version": "2.8" }, { "model": "dnrd", "scope": "eq", "trust": 1.3, "vendor": "dnrd", "version": "2.7" }, { "model": "dnrd", "scope": "eq", "trust": 1.3, "vendor": "dnrd", "version": "2.6" }, { "model": "dnrd", "scope": "eq", "trust": 1.3, "vendor": "dnrd", "version": "2.5" }, { "model": "dnrd", "scope": "eq", "trust": 1.3, "vendor": "dnrd", "version": "2.4" }, { "model": "dnrd", "scope": "eq", "trust": 1.3, "vendor": "dnrd", "version": "2.3" }, { "model": "dnrd", "scope": "eq", "trust": 1.3, "vendor": "dnrd", "version": "2.2" }, { "model": "dnrd", "scope": "eq", "trust": 1.3, "vendor": "dnrd", "version": "2.1" }, { "model": "dnrd", "scope": "eq", "trust": 1.3, "vendor": "dnrd", "version": "2.0" }, { "model": "dnrd", "scope": "eq", "trust": 1.3, "vendor": "dnrd", "version": "1.4" }, { "model": "dnrd", "scope": "eq", "trust": 1.3, "vendor": "dnrd", "version": "1.3" }, { "model": "dnrd", "scope": "eq", "trust": 1.3, "vendor": "dnrd", "version": "1.2" }, { "model": "dnrd", "scope": "eq", "trust": 1.3, "vendor": "dnrd", "version": "1.1" }, { "model": "dnrd", "scope": "eq", "trust": 1.3, "vendor": "dnrd", "version": "1.0" }, { "model": "delegate", "scope": "eq", "trust": 1.3, "vendor": "delegate", "version": "8.9.4" }, { "model": "delegate", "scope": "eq", "trust": 1.3, "vendor": "delegate", "version": "8.9.3" }, { "model": "delegate", "scope": "eq", "trust": 1.3, "vendor": "delegate", "version": "8.9.2" }, { "model": "delegate", "scope": "eq", "trust": 1.3, "vendor": "delegate", "version": "8.9.1" }, { "model": "delegate", "scope": "eq", "trust": 1.3, "vendor": "delegate", "version": "8.9" }, { "model": "delegate", "scope": "eq", "trust": 1.3, "vendor": "delegate", "version": "8.5.0" }, { "model": "delegate", "scope": "eq", "trust": 1.3, "vendor": "delegate", "version": "8.4.0" }, { "model": "delegate", "scope": "eq", "trust": 1.3, "vendor": "delegate", "version": "8.3.4" }, { "model": "delegate", "scope": "eq", "trust": 1.3, "vendor": "delegate", "version": "8.3.3" }, { "model": "delegate", "scope": "eq", "trust": 1.3, "vendor": "delegate", "version": "7.9.11" }, { "model": "delegate", "scope": "eq", "trust": 1.3, "vendor": "delegate", "version": "7.8.2" }, { "model": "delegate", "scope": "eq", "trust": 1.3, "vendor": "delegate", "version": "7.8.1" }, { "model": "delegate", "scope": "eq", "trust": 1.3, "vendor": "delegate", "version": "7.8.0" }, { "model": "delegate", "scope": "eq", "trust": 1.3, "vendor": "delegate", "version": "7.7.1" }, { "model": "delegate", "scope": "eq", "trust": 1.3, "vendor": "delegate", "version": "7.7.0" }, { "model": "2420 network camera", "scope": "eq", "trust": 1.0, "vendor": "axis", "version": "2.31" }, { "model": "raidendnsd", "scope": "eq", "trust": 1.0, "vendor": "team johnlong", "version": "*" }, { "model": "2420 network camera", "scope": "eq", "trust": 1.0, "vendor": "axis", "version": "2.40" }, { "model": "2110 network camera", "scope": "eq", "trust": 1.0, "vendor": "axis", "version": "2.40" }, { "model": "2460 network dvr", "scope": "eq", "trust": 1.0, "vendor": "axis", "version": "3.12" }, { "model": "2100 network camera", "scope": "eq", "trust": 1.0, "vendor": "axis", "version": "2.12" }, { "model": "2420 network camera", "scope": "eq", "trust": 1.0, "vendor": "axis", "version": "2.12" }, { "model": "2110 network camera", "scope": "eq", "trust": 1.0, "vendor": "axis", "version": "2.12" }, { "model": "2420 network camera", "scope": "eq", "trust": 1.0, "vendor": "axis", "version": "2.34" }, { "model": "wingate", "scope": "eq", "trust": 1.0, "vendor": "qbik", "version": "6.0" }, { "model": "2100 network camera", "scope": "eq", "trust": 1.0, "vendor": "axis", "version": "2.0" }, { "model": "2100 network camera", "scope": "eq", "trust": 1.0, "vendor": "axis", "version": "2.32" }, { "model": "posadis", "scope": "eq", "trust": 1.0, "vendor": "posadis", "version": "m5pre2" }, { "model": "2100 network camera", "scope": "eq", "trust": 1.0, "vendor": "axis", "version": "2.30" }, { "model": "2110 network camera", "scope": "eq", "trust": 1.0, "vendor": "axis", "version": "2.32" }, { "model": "2420 network camera", "scope": "eq", "trust": 1.0, "vendor": "axis", "version": "2.30" }, { "model": "2110 network camera", "scope": "eq", "trust": 1.0, "vendor": "axis", "version": "2.30" }, { "model": "mydns", "scope": "eq", "trust": 1.0, "vendor": "don moore", "version": "0.10.0" }, { "model": "2400 video server", "scope": "eq", "trust": 1.0, "vendor": "axis", "version": "3.11" }, { "model": "2100 network camera", "scope": "eq", "trust": 1.0, "vendor": "axis", "version": "2.01" }, { "model": "2120 network camera", "scope": "eq", "trust": 1.0, "vendor": "axis", "version": "2.30" }, { "model": "mydns", "scope": "eq", "trust": 1.0, "vendor": "don moore", "version": "0.7" }, { "model": "2100 network camera", "scope": "eq", "trust": 1.0, "vendor": "axis", "version": "2.31" }, { "model": "2100 network camera", "scope": "eq", "trust": 1.0, "vendor": "axis", "version": "2.03" }, { "model": "2100 network camera", "scope": "eq", "trust": 1.0, "vendor": "axis", "version": "2.40" }, { "model": "2120 network camera", "scope": "eq", "trust": 1.0, "vendor": "axis", "version": "2.32" }, { "model": "2110 network camera", "scope": "eq", "trust": 1.0, "vendor": "axis", "version": "2.31" }, { "model": "2120 network camera", "scope": "eq", "trust": 1.0, "vendor": "axis", "version": "2.41" }, { "model": "dns server", "scope": "eq", "trust": 1.0, "vendor": "pliant", "version": "*" }, { "model": "wingate", "scope": "eq", "trust": 1.0, "vendor": "qbik", "version": "4.1_beta_a" }, { "model": "2100 network camera", "scope": "eq", "trust": 1.0, "vendor": "axis", "version": "2.34" }, { "model": "2100 network camera", "scope": "eq", "trust": 1.0, "vendor": "axis", "version": "2.02" }, { "model": "2110 network camera", "scope": "eq", "trust": 1.0, "vendor": "axis", "version": "2.34" }, { "model": "mydns", "scope": "eq", "trust": 1.0, "vendor": "don moore", "version": "0.9" }, { "model": "2120 network camera", "scope": "eq", "trust": 1.0, "vendor": "axis", "version": "2.31" }, { "model": "2120 network camera", "scope": "eq", "trust": 1.0, "vendor": "axis", "version": "2.40" }, { "model": "2400 video server", "scope": "eq", "trust": 1.0, "vendor": "axis", "version": "3.12" }, { "model": "mydns", "scope": "eq", "trust": 1.0, "vendor": "don moore", "version": "0.6" }, { "model": "mydns", "scope": "eq", "trust": 1.0, "vendor": "don moore", "version": "0.8" }, { "model": "2120 network camera", "scope": "eq", "trust": 1.0, "vendor": "axis", "version": "2.12" }, { "model": "2120 network camera", "scope": "eq", "trust": 1.0, "vendor": "axis", "version": "2.34" }, { "model": "2401 video server", "scope": "eq", "trust": 1.0, "vendor": "axis", "version": "3.12" }, { "model": "posadis", "scope": "eq", "trust": 1.0, "vendor": "posadis", "version": "m5pre1" }, { "model": "2420 network camera", "scope": "eq", "trust": 1.0, "vendor": "axis", "version": "2.32" }, { "model": "2100 network camera", "scope": "eq", "trust": 1.0, "vendor": "axis", "version": "2.41" }, { "model": "wingate", "scope": "eq", "trust": 1.0, "vendor": "qbik", "version": "6.0.1_build_995" }, { "model": "wingate", "scope": "eq", "trust": 1.0, "vendor": "qbik", "version": "6.0.1_build_993" }, { "model": "2420 network camera", "scope": "eq", "trust": 1.0, "vendor": "axis", "version": "2.41" }, { "model": "2100 network camera", "scope": "eq", "trust": 1.0, "vendor": "axis", "version": "2.33" }, { "model": "2110 network camera", "scope": "eq", "trust": 1.0, "vendor": "axis", "version": "2.41" }, { "model": "2420 network camera", "scope": "eq", "trust": 1.0, "vendor": "axis", "version": "2.33" }, { "model": "", "scope": null, "trust": 0.8, "vendor": "multiple vendors", "version": null }, { "model": "johnlong raidendnsd", "scope": null, "trust": 0.3, "vendor": "team", "version": null }, { "model": "wingate build", "scope": "eq", "trust": 0.3, "vendor": "qbik", "version": "6.0.1995" }, { "model": "wingate build", "scope": "eq", "trust": 0.3, "vendor": "qbik", "version": "6.0.1993" }, { "model": "wingate", "scope": "eq", "trust": 0.3, "vendor": "qbik", "version": "6.0.0" }, { "model": "wingate beta a", "scope": "eq", "trust": 0.3, "vendor": "qbik", "version": "4.1" }, { "model": "m5pre2", "scope": null, "trust": 0.3, "vendor": "posadis", "version": null }, { "model": "m5pre1", "scope": null, "trust": 0.3, "vendor": "posadis", "version": null }, { "model": "dns server", "scope": null, "trust": 0.3, "vendor": "pliant", "version": null }, { "model": "moore mydns", "scope": "eq", "trust": 0.3, "vendor": "don", "version": "0.10.0" }, { "model": "moore mydns", "scope": "eq", "trust": 0.3, "vendor": "don", "version": "0.9x" }, { "model": "moore mydns", "scope": "eq", "trust": 0.3, "vendor": "don", "version": "0.8x" }, { "model": "moore mydns", "scope": "eq", "trust": 0.3, "vendor": "don", "version": "0.7x" }, { "model": "moore mydns", "scope": "eq", "trust": 0.3, "vendor": "don", "version": "0.6x" }, { "model": "communications digital video recorder", "scope": "eq", "trust": 0.3, "vendor": "axis", "version": "24603.12" }, { "model": "communications network camera", "scope": "eq", "trust": 0.3, "vendor": "axis", "version": "24202.41" }, { "model": "communications network camera", "scope": "eq", "trust": 0.3, "vendor": "axis", "version": "24202.40" }, { "model": "communications network camera", "scope": "eq", "trust": 0.3, "vendor": "axis", "version": "24202.34" }, { "model": "communications network camera", "scope": "eq", "trust": 0.3, "vendor": "axis", "version": "24202.33" }, { "model": "communications network camera", "scope": "eq", "trust": 0.3, "vendor": "axis", "version": "24202.32" }, { "model": "communications network camera", "scope": "eq", "trust": 0.3, "vendor": "axis", "version": "24202.31" }, { "model": "communications network camera", "scope": "eq", "trust": 0.3, "vendor": "axis", "version": "24202.30" }, { "model": "communications network camera", "scope": "eq", "trust": 0.3, "vendor": "axis", "version": "24202.12" }, { "model": "communications video server", "scope": "eq", "trust": 0.3, "vendor": "axis", "version": "2401+3.12" }, { "model": "communications video server", "scope": "eq", "trust": 0.3, "vendor": "axis", "version": "2400+3.12" }, { "model": "communications video server", "scope": "eq", "trust": 0.3, "vendor": "axis", "version": "2400+3.11" }, { "model": "communications network camera", "scope": "eq", "trust": 0.3, "vendor": "axis", "version": "21202.41" }, { "model": "communications network camera", "scope": "eq", "trust": 0.3, "vendor": "axis", "version": "21202.40" }, { "model": "communications network camera", "scope": "eq", "trust": 0.3, "vendor": "axis", "version": "21202.34" }, { "model": "communications network camera", "scope": "eq", "trust": 0.3, "vendor": "axis", "version": "21202.32" }, { "model": "communications network camera", "scope": "eq", "trust": 0.3, "vendor": "axis", "version": "21202.31" }, { "model": "communications network camera", "scope": "eq", "trust": 0.3, "vendor": "axis", "version": "21202.30" }, { "model": "communications network camera", "scope": "eq", "trust": 0.3, "vendor": "axis", "version": "21202.12" }, { "model": "communications network camera", "scope": "eq", "trust": 0.3, "vendor": "axis", "version": "21102.41" }, { "model": "communications network camera", "scope": "eq", "trust": 0.3, "vendor": "axis", "version": "21102.40" }, { "model": "communications network camera", "scope": "eq", "trust": 0.3, "vendor": "axis", "version": "21102.34" }, { "model": "communications network camera", "scope": "eq", "trust": 0.3, "vendor": "axis", "version": "21102.32" }, { "model": "communications network camera", "scope": "eq", "trust": 0.3, "vendor": "axis", "version": "21102.31" }, { "model": "communications network camera", "scope": "eq", "trust": 0.3, "vendor": "axis", "version": "21102.30" }, { "model": "communications network camera", "scope": "eq", "trust": 0.3, "vendor": "axis", "version": "21102.12" }, { "model": "communications network camera", "scope": "eq", "trust": 0.3, "vendor": "axis", "version": "21002.41" }, { "model": "communications network camera", "scope": "eq", "trust": 0.3, "vendor": "axis", "version": "21002.40" }, { "model": "communications network camera", "scope": "eq", "trust": 0.3, "vendor": "axis", "version": "21002.34" }, { "model": "communications network camera", "scope": "eq", "trust": 0.3, "vendor": "axis", "version": "21002.33" }, { "model": "communications network camera", "scope": "eq", "trust": 0.3, "vendor": "axis", "version": "21002.32" }, { "model": "communications network camera", "scope": "eq", "trust": 0.3, "vendor": "axis", "version": "21002.31" }, { "model": "communications network camera", "scope": "eq", "trust": 0.3, "vendor": "axis", "version": "21002.30" }, { "model": "communications network camera", "scope": "eq", "trust": 0.3, "vendor": "axis", "version": "21002.12" }, { "model": "communications network camera", "scope": "eq", "trust": 0.3, "vendor": "axis", "version": "21002.03" }, { "model": "communications network camera", "scope": "eq", "trust": 0.3, "vendor": "axis", "version": "21002.02" }, { "model": "communications network camera", "scope": "eq", "trust": 0.3, "vendor": "axis", "version": "21002.01" }, { "model": "communications network camera", "scope": "eq", "trust": 0.3, "vendor": "axis", "version": "21002.0" }, { "model": "wingate build", "scope": "ne", "trust": 0.3, "vendor": "qbik", "version": "6.0.31005" }, { "model": "wingate build", "scope": "ne", "trust": 0.3, "vendor": "qbik", "version": "6.0.21001" }, { "model": "wingate build", "scope": "ne", "trust": 0.3, "vendor": "qbik", "version": "6.0.21000" }, { "model": "posadis", "scope": "ne", "trust": 0.3, "vendor": "posadis", "version": "0.60.5" }, { "model": "posadis", "scope": "ne", "trust": 0.3, "vendor": "posadis", "version": "0.60.4" }, { "model": "posadis", "scope": "ne", "trust": 0.3, "vendor": "posadis", "version": "0.60.3" }, { "model": "posadis", "scope": "ne", "trust": 0.3, "vendor": "posadis", "version": "0.60.2" }, { "model": "quickdns server", "scope": "ne", "trust": 0.3, "vendor": "men mice", "version": "3.5.2" }, { "model": "quickdns server", "scope": "ne", "trust": 0.3, "vendor": "men mice", "version": "2.2.3" }, { "model": "maradns", "scope": "ne", "trust": 0.3, "vendor": "maradns", "version": "1.0.23" }, { "model": "maradns", "scope": "ne", "trust": 0.3, "vendor": "maradns", "version": "0.9.01" }, { "model": "maradns", "scope": "ne", "trust": 0.3, "vendor": "maradns", "version": "0.9.00" }, { "model": "maradns", "scope": "ne", "trust": 0.3, "vendor": "maradns", "version": "0.8.99" }, { "model": "bind", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "9.2.3" }, { "model": "bind", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "9.2.2" }, { "model": "bind", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "9.2.1" }, { "model": "bind", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "9.2" }, { "model": "bind", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "9.1.3" }, { "model": "bind", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "9.1.2" }, { "model": "bind", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "9.1.1" }, { "model": "bind", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "9.1" }, { "model": "bind", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "9.0.1" }, { "model": "bind", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "9.0" }, { "model": "bind", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "8.4.3" }, { "model": "bind", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "8.4.2" }, { "model": "bind", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "8.4.1" }, { "model": "bind", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "8.4" }, { "model": "bind", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "8.3.7" }, { "model": "bind", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "8.3.6" }, { "model": "bind", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "8.3.5" }, { "model": "bind", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "8.3.4" }, { "model": "bind", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "8.3.3" }, { "model": "bind", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "8.3.2" }, { "model": "bind", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "8.3.1" }, { "model": "bind", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "8.3.0" }, { "model": "bind", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "8.2.7" }, { "model": "bind", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "8.2.6" }, { "model": "bind", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "8.2.5" }, { "model": "bind", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "8.2.4" }, { "model": "bind beta", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "8.2.3" }, { "model": "bind", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "8.2.3" }, { "model": "bind p7", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "8.2.2" }, { "model": "bind p6", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "8.2.2" }, { "model": "bind p5", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "8.2.2" }, { "model": "bind p4", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "8.2.2" }, { "model": "bind p3", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "8.2.2" }, { "model": "bind p2", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "8.2.2" }, { "model": "bind p1", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "8.2.2" }, { "model": "bind", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "8.2.2" }, { "model": "bind", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "8.2.1" }, { "model": "bind", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "8.2" }, { "model": "bind", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "8.1.2" }, { "model": "bind", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "8.1.1" }, { "model": "bind", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "8.1" }, { "model": "bind", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "4.9.11" }, { "model": "bind ow2", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "4.9.10" }, { "model": "bind", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "4.9.10" }, { "model": "bind", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "4.9.9" }, { "model": "bind", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "4.9.8" }, { "model": "bind -t1b", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "4.9.7" }, { "model": "bind", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "4.9.7" }, { "model": "bind", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "4.9.6" }, { "model": "bind p1", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "4.9.5" }, { "model": "bind", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "4.9.5" }, { "model": "bind p1", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "4.9.4" }, { "model": "bind", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "4.9.4" }, { "model": "bind", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "4.9.3" }, { "model": "bind", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "4.9.2" }, { "model": "bind", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "4.9" }, { "model": "bind", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "4.8.3" }, { "model": "bind", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "4.8.2.1" }, { "model": "bind", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "4.8.1" }, { "model": "bind", "scope": "ne", "trust": 0.3, "vendor": "isc", "version": "4.8" }, { "model": "moore mydns", "scope": "ne", "trust": 0.3, "vendor": "don", "version": "0.11.0" }, { "model": "moore mydns", "scope": "ne", "trust": 0.3, "vendor": "don", "version": "0.10.4" }, { "model": "moore mydns", "scope": "ne", "trust": 0.3, "vendor": "don", "version": "0.10.3" }, { "model": "moore mydns", "scope": "ne", "trust": 0.3, "vendor": "don", "version": "0.10.2" }, { "model": "moore mydns", "scope": "ne", "trust": 0.3, "vendor": "don", "version": "0.10.1" }, { "model": "dnrd", "scope": "ne", "trust": 0.3, "vendor": "dnrd", "version": "2.17.1" }, { "model": "dnrd", "scope": "ne", "trust": 0.3, "vendor": "dnrd", "version": "2.17" }, { "model": "dnrd", "scope": "ne", "trust": 0.3, "vendor": "dnrd", "version": "2.16" }, { "model": "dnrd", "scope": "ne", "trust": 0.3, "vendor": "dnrd", "version": "2.15" }, { "model": "dnrd", "scope": "ne", "trust": 0.3, "vendor": "dnrd", "version": "2.14" }, { "model": "dnrd", "scope": "ne", "trust": 0.3, "vendor": "dnrd", "version": "2.13" }, { "model": "dnrd", "scope": "ne", "trust": 0.3, "vendor": "dnrd", "version": "2.12" }, { "model": "dnrd", "scope": "ne", "trust": 0.3, "vendor": "dnrd", "version": "2.11" }, { "model": "delegate", "scope": "ne", "trust": 0.3, "vendor": "delegate", "version": "8.9.6" }, { "model": "communications digital video recorder", "scope": "ne", "trust": 0.3, "vendor": "axis", "version": "24603.13" }, { "model": "communications network camera", "scope": "ne", "trust": 0.3, "vendor": "axis", "version": "24202.42" }, { "model": "communications video server", "scope": "ne", "trust": 0.3, "vendor": "axis", "version": "2401+3.13" }, { "model": "communications video server", "scope": "ne", "trust": 0.3, "vendor": "axis", "version": "2400+3.13" }, { "model": "communications network camera", "scope": "ne", "trust": 0.3, "vendor": "axis", "version": "21202.42" }, { "model": "communications network camera", "scope": "ne", "trust": 0.3, "vendor": "axis", "version": "21102.42" }, { "model": "communications network camera", "scope": "ne", "trust": 0.3, "vendor": "axis", "version": "21002.42" } ], "sources": [ { "db": "BID", "id": "11642" }, { "db": "JVNDB", "id": "JVNDB-2004-000608" }, { "db": "NVD", "id": "CVE-2004-0789" }, { "db": "CNNVD", "id": "CNNVD-200412-718" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:delegate:delegate:7.8.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:delegate:delegate:7.8.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:delegate:delegate:8.9.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:delegate:delegate:8.9.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:dnrd:dnrd:1.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:dnrd:dnrd:1.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:dnrd:dnrd:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:dnrd:dnrd:2.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:dnrd:dnrd:2.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:don_moore:mydns:0.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:maradns:maradns:0.5.28:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:posadis:posadis:0.50.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:posadis:posadis:0.50.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:qbik:wingate:3.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:qbik:wingate:4.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:delegate:delegate:7.7.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:delegate:delegate:7.8.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:delegate:delegate:8.5.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:delegate:delegate:8.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:dnrd:dnrd:1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:dnrd:dnrd:1.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:dnrd:dnrd:2.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:dnrd:dnrd:2.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:don_moore:mydns:0.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:don_moore:mydns:0.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:pliant:pliant_dns_server:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:posadis:posadis:0.50.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:posadis:posadis:0.50.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:posadis:posadis:m5pre1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:posadis:posadis:m5pre2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:team_johnlong:raidendnsd:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:delegate:delegate:7.9.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:delegate:delegate:8.3.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:delegate:delegate:8.9.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:delegate:delegate:8.9.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:dnrd:dnrd:2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:dnrd:dnrd:2.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:dnrd:dnrd:2.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:dnrd:dnrd:2.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:maradns:maradns:0.5.29:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:maradns:maradns:0.5.30:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:posadis:posadis:0.50.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:posadis:posadis:0.50.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:qbik:wingate:4.1_beta_a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:qbik:wingate:6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:delegate:delegate:7.7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:delegate:delegate:8.3.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:delegate:delegate:8.4.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:delegate:delegate:8.9.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:dnrd:dnrd:1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:dnrd:dnrd:2.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:dnrd:dnrd:2.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:don_moore:mydns:0.10.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:don_moore:mydns:0.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:maradns:maradns:0.5.31:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:maradns:maradns:0.8.05:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:posadis:posadis:0.60.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:posadis:posadis:0.60.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:qbik:wingate:6.0.1_build_993:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:qbik:wingate:6.0.1_build_995:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:axis:2100_network_camera:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:axis:2100_network_camera:2.01:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:axis:2100_network_camera:2.34:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:axis:2100_network_camera:2.40:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:axis:2110_network_camera:2.40:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:axis:2110_network_camera:2.41:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:axis:2100_network_camera:2.31:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:axis:2100_network_camera:2.32:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:axis:2100_network_camera:2.33:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:axis:2110_network_camera:2.32:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:axis:2110_network_camera:2.34:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:axis:2120_network_camera:2.34:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:axis:2120_network_camera:2.40:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:axis:2420_network_camera:2.32:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:axis:2420_network_camera:2.33:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:axis:2100_network_camera:2.02:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:axis:2100_network_camera:2.03:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:axis:2100_network_camera:2.41:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:axis:2110_network_camera:2.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:axis:2120_network_camera:2.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:axis:2120_network_camera:2.30:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:axis:2400_video_server:3.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:axis:2401_video_server:3.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:axis:2420_network_camera:2.41:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:axis:2460_network_dvr:3.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:axis:2120_network_camera:2.41:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:axis:2400_video_server:3.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:axis:2420_network_camera:2.34:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:axis:2420_network_camera:2.40:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:axis:2100_network_camera:2.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:axis:2100_network_camera:2.30:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:axis:2110_network_camera:2.30:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:axis:2110_network_camera:2.31:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:axis:2120_network_camera:2.31:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:axis:2120_network_camera:2.32:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:axis:2420_network_camera:2.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:axis:2420_network_camera:2.30:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:axis:2420_network_camera:2.31:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2004-0789" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Roy Arends and Jakob Schlyter are credited on the NISCC advisory. The original discoverer of this vulnerability is unknown at this time.", "sources": [ { "db": "BID", "id": "11642" }, { "db": "CNNVD", "id": "CNNVD-200412-718" } ], "trust": 0.9 }, "cve": "CVE-2004-0789", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2004-0789", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-9219", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2004-0789", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-200412-718", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-9219", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-9219" }, { "db": "JVNDB", "id": "JVNDB-2004-000608" }, { "db": "NVD", "id": "CVE-2004-0789" }, { "db": "CNNVD", "id": "CNNVD-200412-718" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Multiple implementations of the DNS protocol, including (1) Poslib 1.0.2-1 and earlier as used by Posadis, (2) Axis Network products before firmware 3.13, and (3) Men \u0026 Mice Suite 2.2x before 2.2.3 and 3.5.x before 3.5.2, allow remote attackers to cause a denial of service (CPU and network bandwidth consumption) by triggering a communications loop via (a) DNS query packets with localhost as a spoofed source address, or (b) a response packet that triggers a response packet. [CERT/CC VU#887766 See also ] DNS A vulnerability in the protocol implementation has been identified. Depending on the implementation, between servers Query - response A storm may occur. Also, localhost UDP 53 Port is From If a query with is sent, the server may continue to respond to the server itself and resources may be exhausted.Denial of service (denial-of-service, DoS) You can be attacked. Multiple DNS vendors are reported susceptible to a denial of service vulnerability", "sources": [ { "db": "NVD", "id": "CVE-2004-0789" }, { "db": "JVNDB", "id": "JVNDB-2004-000608" }, { "db": "BID", "id": "11642" }, { "db": "VULHUB", "id": "VHN-9219" } ], "trust": 1.98 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2004-0789", "trust": 2.8 }, { "db": "BID", "id": "11642", "trust": 1.4 }, { "db": "SECUNIA", "id": "13145", "trust": 1.1 }, { "db": "SECTRACK", "id": "1012157", "trust": 1.1 }, { "db": "XF", "id": "17996", "trust": 0.8 }, { "db": "XF", "id": "17997", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2004-000608", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-200412-718", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-9219", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-9219" }, { "db": "BID", "id": "11642" }, { "db": "JVNDB", "id": "JVNDB-2004-000608" }, { "db": "NVD", "id": "CVE-2004-0789" }, { "db": "CNNVD", "id": "CNNVD-200412-718" } ] }, "id": "VAR-200412-0018", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-9219" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:13:45.102000Z", "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2004-0789" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.1, "url": "http://www.securityfocus.com/bid/11642" }, { "trust": 1.1, "url": "http://www.posadis.org/advisories/pos_adv_006.txt" }, { "trust": 1.1, "url": "http://www.niscc.gov.uk/niscc/docs/al-20041130-00862.html?lang=en" }, { "trust": 1.1, "url": "http://www.niscc.gov.uk/niscc/docs/re-20041109-00957.pdf" }, { "trust": 1.1, "url": "http://securitytracker.com/id?1012157" }, { "trust": 1.1, "url": "http://secunia.com/advisories/13145" }, { "trust": 1.1, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17997" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=2004-0789" }, { "trust": 0.8, "url": "http://xforce.iss.net/xforce/xfdb/17997" }, { "trust": 0.8, "url": "http://xforce.iss.net/xforce/xfdb/17996" }, { "trust": 0.8, "url": "http://jvn.jp/niscc/niscc-758884/" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2004-0789" }, { "trust": 0.3, "url": "http://www.se.axis.com/techsup/cdsrv/storpoint_cd/index.html" }, { "trust": 0.3, "url": "http://www.delegate.org/delegate/" }, { "trust": 0.3, "url": "http://www.delegate.org/mail-lists/delegate-en/2753" }, { "trust": 0.3, "url": "http://www.maradns.org/" }, { "trust": 0.3, "url": "http://mydns.bboy.net/" }, { "trust": 0.3, "url": "http://mydns.bboy.net/download/changelog.html" }, { "trust": 0.3, "url": "http://www.axis.com/products/camera_servers/index.htm" }, { "trust": 0.3, "url": "http://www.uniras.gov.uk/vuls/2004/758884/index.htm" }, { "trust": 0.3, "url": "http://pliant.cx/pliant/protocol/dns/" }, { "trust": 0.3, "url": "http://posadis.sourceforge.net/" }, { "trust": 0.3, "url": "http://www.posadis.org/security/pos_adv_006.txt" }, { "trust": 0.3, "url": "http://wingate.deerfield.com" }, { "trust": 0.3, "url": "/archive/1/381612" } ], "sources": [ { "db": "VULHUB", "id": "VHN-9219" }, { "db": "BID", "id": "11642" }, { "db": "JVNDB", "id": "JVNDB-2004-000608" }, { "db": "NVD", "id": "CVE-2004-0789" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-9219" }, { "db": "BID", "id": "11642" }, { "db": "JVNDB", "id": "JVNDB-2004-000608" }, { "db": "NVD", "id": "CVE-2004-0789" }, { "db": "CNNVD", "id": "CNNVD-200412-718" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2004-12-31T00:00:00", "db": "VULHUB", "id": "VHN-9219" }, { "date": "2004-11-09T00:00:00", "db": "BID", "id": "11642" }, { "date": "2009-04-03T00:00:00", "db": "JVNDB", "id": "JVNDB-2004-000608" }, { "date": "2004-12-31T05:00:00", "db": "NVD", "id": "CVE-2004-0789" }, { "date": "2004-12-31T00:00:00", "db": "CNNVD", "id": "CNNVD-200412-718" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-07-11T00:00:00", "db": "VULHUB", "id": "VHN-9219" }, { "date": "2009-07-12T08:06:00", "db": "BID", "id": "11642" }, { "date": "2009-04-03T00:00:00", "db": "JVNDB", "id": "JVNDB-2004-000608" }, { "date": "2017-07-11T01:30:28.667000", "db": "NVD", "id": "CVE-2004-0789" }, { "date": "2006-04-07T00:00:00", "db": "CNNVD", "id": "CNNVD-200412-718" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-200412-718" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "DNS Vulnerability in protocol implementation", "sources": [ { "db": "JVNDB", "id": "JVNDB-2004-000608" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Design Error", "sources": [ { "db": "BID", "id": "11642" }, { "db": "CNNVD", "id": "CNNVD-200412-718" } ], "trust": 0.9 } }
var-200512-0640
Vulnerability from variot
The DNS implementation in DeleGate 8.10.2 and earlier allows remote attackers to cause a denial of service via a compressed DNS packet with a label length byte with an incorrect offset, which could trigger an infinite loop. Note that some other DNS packet processing systems have the issues related to this vulnerability. Multiple DNS vendors are susceptible to a remote denial-of-service vulnerability. This issue affects both DNS servers and clients. This issue arises when an affected application handles a specially crafted DNS message. A successful attack would crash the affected client or server.
Bist Du interessiert an einem neuen Job in IT-Sicherheit?
Secunia hat zwei freie Stellen als Junior und Senior Spezialist in IT- Sicherheit: http://secunia.com/secunia_vacancies/
TITLE: Cisco Various Products Compressed DNS Messages Denial of Service
SECUNIA ADVISORY ID: SA15472
VERIFY ADVISORY: http://secunia.com/advisories/15472/
CRITICAL: Less critical
IMPACT: DoS
WHERE:
From remote
OPERATING SYSTEM: Cisco ATA 180 Series Analog Telephone Adaptors http://secunia.com/product/2810/
SOFTWARE: Cisco IP Phone 7900 Series http://secunia.com/product/2809/ Cisco ACNS Software Version 5.x http://secunia.com/product/2268/ Cisco ACNS Software Version 4.x http://secunia.com/product/2269/ Cisco Unity Express 2.x http://secunia.com/product/5151/
DESCRIPTION: A vulnerability has been reported in various Cisco products, which can be exploited by malicious people to cause a DoS (Denial of Service).
Successful exploitation crashes a vulnerable device or causes it to function abnormally.
The vulnerability affects the following products: * Cisco IP Phones 7902/7905/7912 * Cisco ATA (Analog Telephone Adaptor) 186/188 * Cisco Unity Express
The following Cisco ACNS (Application and Content Networking System) devices are also affected: * Cisco 500 Series Content Engines * Cisco 7300 Series Content Engines * Cisco Content Routers 4400 series * Cisco Content Distribution Manager 4600 series * Cisco Content Engine Module for Cisco 2600, 2800, 3600, 3700, and 3800 series Integrated Service Routers.
SOLUTION: See patch matrix in vendor advisory for information about fixes. http://www.cisco.com/warp/public/707/cisco-sn-20050524-dns.shtml#software
PROVIDED AND/OR DISCOVERED BY: NISCC credits Dr. Steve Beaty.
ORIGINAL ADVISORY: Cisco: http://www.cisco.com/warp/public/707/cisco-sn-20050524-dns.shtml
NISCC: http://www.niscc.gov.uk/niscc/docs/al-20050524-00433.html
About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
Show details on source website
{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200512-0640", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "delegate", "scope": "eq", "trust": 1.3, "vendor": "delegate", "version": "8.10.1" }, { "model": "delegate", "scope": "eq", "trust": 1.3, "vendor": "delegate", "version": "8.10" }, { "model": "delegate", "scope": "eq", "trust": 1.3, "vendor": "delegate", "version": "8.9.6" }, { "model": "delegate", "scope": "eq", "trust": 1.3, "vendor": "delegate", "version": "8.9.5" }, { "model": "delegate", "scope": "eq", "trust": 1.3, "vendor": "delegate", "version": "8.9.4" }, { "model": "delegate", "scope": "eq", "trust": 1.3, "vendor": "delegate", "version": "8.9.3" }, { "model": "delegate", "scope": "eq", "trust": 1.3, "vendor": "delegate", "version": "8.9.2" }, { "model": "delegate", "scope": "eq", "trust": 1.3, "vendor": "delegate", "version": "8.9.1" }, { "model": "delegate", "scope": "eq", "trust": 1.3, "vendor": "delegate", "version": "8.9" }, { "model": "delegate", "scope": "eq", "trust": 1.3, "vendor": "delegate", "version": "8.5.0" }, { "model": "delegate", "scope": "eq", "trust": 1.3, "vendor": "delegate", "version": "8.4.0" }, { "model": "delegate", "scope": "eq", "trust": 1.3, "vendor": "delegate", "version": "8.3.4" }, { "model": "delegate", "scope": "eq", "trust": 1.3, "vendor": "delegate", "version": "8.3.3" }, { "model": "delegate", "scope": "eq", "trust": 1.3, "vendor": "delegate", "version": "7.9.11" }, { "model": "delegate", "scope": "eq", "trust": 1.3, "vendor": "delegate", "version": "7.8.2" }, { "model": "delegate", "scope": "eq", "trust": 1.3, "vendor": "delegate", "version": "7.8.1" }, { "model": "delegate", "scope": "eq", "trust": 1.3, "vendor": "delegate", "version": "7.8.0" }, { "model": "delegate", "scope": "eq", "trust": 1.3, "vendor": "delegate", "version": "7.7.1" }, { "model": "delegate", "scope": "eq", "trust": 1.3, "vendor": "delegate", "version": "7.7.0" }, { "model": "delegate", "scope": "eq", "trust": 1.0, "vendor": "delegate", "version": "5.9.3" }, { "model": "delegate", "scope": "lte", "trust": 1.0, "vendor": "delegate", "version": "8.10.2" }, { "model": "delegate", "scope": "eq", "trust": 1.0, "vendor": "etl", "version": "6.0" }, { "model": "delegate", "scope": "eq", "trust": 1.0, "vendor": "etl", "version": "5.9" }, { "model": "delegate", "scope": "eq", "trust": 0.9, "vendor": "delegate", "version": "8.10.2" }, { "model": null, "scope": null, "trust": 0.8, "vendor": "ethereal", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "tcpdump", "version": null }, { "model": "delegate", "scope": "eq", "trust": 0.8, "vendor": "delegate", "version": "8.10.2 and eariler" }, { "model": "application \u0026 content networking software", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "powerdns", "scope": "eq", "trust": 0.3, "vendor": "powerdns", "version": "2.9.16" }, { "model": "powerdns", "scope": "eq", "trust": 0.3, "vendor": "powerdns", "version": "2.9.15" }, { "model": "powerdns", "scope": "eq", "trust": 0.3, "vendor": "powerdns", "version": "2.8" }, { "model": "rc1", "scope": "eq", "trust": 0.3, "vendor": "powerdns", "version": "2.0" }, { "model": "dnrd", "scope": "eq", "trust": 0.3, "vendor": "dnrd", "version": "2.10" }, { "model": "dnrd", "scope": "eq", "trust": 0.3, "vendor": "dnrd", "version": "2.9" }, { "model": "dnrd", "scope": "eq", "trust": 0.3, "vendor": "dnrd", "version": "2.8" }, { "model": "dnrd", "scope": "eq", "trust": 0.3, "vendor": "dnrd", "version": "2.7" }, { "model": "dnrd", "scope": "eq", "trust": 0.3, "vendor": "dnrd", "version": "2.6" }, { "model": "dnrd", "scope": "eq", "trust": 0.3, "vendor": "dnrd", "version": "2.5" }, { "model": "dnrd", "scope": "eq", "trust": 0.3, "vendor": "dnrd", "version": "2.4" }, { "model": "dnrd", "scope": "eq", "trust": 0.3, "vendor": "dnrd", "version": "2.3" }, { "model": "dnrd", "scope": "eq", "trust": 0.3, "vendor": "dnrd", "version": "2.2" }, { "model": "dnrd", "scope": "eq", "trust": 0.3, "vendor": "dnrd", "version": "2.1" }, { "model": "dnrd", "scope": "eq", "trust": 0.3, "vendor": "dnrd", "version": "2.0" }, { "model": "dnrd", "scope": "eq", "trust": 0.3, "vendor": "dnrd", "version": "1.4" }, { "model": "dnrd", "scope": "eq", "trust": 0.3, "vendor": "dnrd", "version": "1.3" }, { "model": "dnrd", "scope": "eq", "trust": 0.3, "vendor": "dnrd", "version": "1.2" }, { "model": "dnrd", "scope": "eq", "trust": 0.3, "vendor": "dnrd", "version": "1.1" }, { "model": "dnrd", "scope": "eq", "trust": 0.3, "vendor": "dnrd", "version": "1.0" }, { "model": "unity express", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "subscriber edge services manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.3(1)" }, { "model": "subscriber edge services manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.2(2)" }, { "model": "subscriber edge services manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.2(1)" }, { "model": "ip phone", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "79120" }, { "model": "ip phone", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7905" }, { "model": "ip phone", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7902" }, { "model": "content router", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4450" }, { "model": "content router", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "44304.1" }, { "model": "content router", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "44304.0" }, { "model": "content router", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4430" }, { "model": "content engine module for cisco router series", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3800" }, { "model": "content engine module for cisco router series", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3700" }, { "model": "content engine module for cisco router series", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3600" }, { "model": "content engine module for cisco router series", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2800" }, { "model": "content engine module for cisco router series", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2600" }, { "model": "content engine", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7325" }, { "model": "content engine", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "73204.1" }, { "model": "content engine", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "73204.0" }, { "model": "content engine", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "73203.1" }, { "model": "content engine", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "73202.2.0" }, { "model": "content engine", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7320" }, { "model": "content engine", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5904.1" }, { "model": "content engine", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5904.0" }, { "model": "content engine", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5903.1" }, { "model": "content engine", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5902.2.0" }, { "model": "content engine", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "590" }, { "model": "content engine", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "565" }, { "model": "content engine", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5604.1" }, { "model": "content engine", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5604.0" }, { "model": "content engine", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5603.1" }, { "model": "content engine", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5602.2.0" }, { "model": "content engine", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "560" }, { "model": "content engine", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "510" }, { "model": "content engine", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5074.1" }, { "model": "content engine", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5074.0" }, { "model": "content engine", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5073.1" }, { "model": "content engine", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5072.2.0" }, { "model": "content engine", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "507" }, { "model": "content distribution manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4670" }, { "model": "content distribution manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "46504.1" }, { "model": "content distribution manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "46504.0" }, { "model": "content distribution manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4650" }, { "model": "content distribution manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "46304.1" }, { "model": "content distribution manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "46304.0" }, { "model": "content distribution manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4630" }, { "model": "ata-188", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ata-186", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "application \u0026 content networking software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.2.3.9" }, { "model": "application \u0026 content networking software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.2.1.7" }, { "model": "application \u0026 content networking software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.2" }, { "model": "application \u0026 content networking software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.1.13.7" }, { "model": "application \u0026 content networking software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.1.11.6" }, { "model": "application \u0026 content networking software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.1" }, { "model": "application \u0026 content networking software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.0.17.6" }, { "model": "application \u0026 content networking software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.0.5" }, { "model": "application \u0026 content networking software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.0.3" }, { "model": "application \u0026 content networking software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.0.1" }, { "model": "application \u0026 content networking software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.0" }, { "model": "application \u0026 content networking software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.2.11" }, { "model": "application \u0026 content networking software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.2.9" }, { "model": "application \u0026 content networking software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.2.7" }, { "model": "application \u0026 content networking software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.2" }, { "model": "application \u0026 content networking software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.1.3" }, { "model": "application \u0026 content networking software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.1.1" }, { "model": "application \u0026 content networking software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0.3" }, { "model": "powerdns", "scope": "ne", "trust": 0.3, "vendor": "powerdns", "version": "2.9.17" }, { "model": "dnrd", "scope": "ne", "trust": 0.3, "vendor": "dnrd", "version": "2.18" }, { "model": "delegate", "scope": "ne", "trust": 0.3, "vendor": "delegate", "version": "8.11.1" }, { "model": "delegate", "scope": "ne", "trust": 0.3, "vendor": "delegate", "version": "8.11" }, { "model": "delegate", "scope": "ne", "trust": 0.3, "vendor": "delegate", "version": "8.10.6" }, { "model": "delegate", "scope": "ne", "trust": 0.3, "vendor": "delegate", "version": "8.10.5" }, { "model": "delegate", "scope": "ne", "trust": 0.3, "vendor": "delegate", "version": "8.10.4" }, { "model": "delegate", "scope": "ne", "trust": 0.3, "vendor": "delegate", "version": "8.10.3" }, { "model": "subscriber edge services manager", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "3.3(2)" }, { "model": "application \u0026 content networking software", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "5.3.3" }, { "model": "application \u0026 content networking software", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "5.2.7" }, { "model": "application \u0026 content networking software", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "5.1.15" } ], "sources": [ { "db": "CERT/CC", "id": "VU#23495" }, { "db": "BID", "id": "13729" }, { "db": "JVNDB", "id": "JVNDB-2005-000343" }, { "db": "NVD", "id": "CVE-2005-0036" }, { "db": "CNNVD", "id": "CNNVD-200512-967" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:delegate:delegate:8.4.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:delegate:delegate:8.5.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:delegate:delegate:8.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:delegate:delegate:8.9.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:delegate:delegate:7.7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:delegate:delegate:8.10.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:delegate:delegate:8.3.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:delegate:delegate:8.9.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:delegate:delegate:8.9.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:delegate:delegate:8.9.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:delegate:delegate:7.8.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:delegate:delegate:7.8.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:delegate:delegate:7.8.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:delegate:delegate:7.9.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:etl:delegate:5.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:etl:delegate:6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:delegate:delegate:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "8.10.2", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:delegate:delegate:5.9.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:delegate:delegate:7.7.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:delegate:delegate:8.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:delegate:delegate:8.3.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:delegate:delegate:8.9.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:delegate:delegate:8.9.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2005-0036" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Discovered by Dr. Steve Beaty from the Department of Mathematical and Computer Sciences at the Metropolitan State College of Denver.", "sources": [ { "db": "BID", "id": "13729" }, { "db": "CNNVD", "id": "CNNVD-200512-967" } ], "trust": 0.9 }, "cve": "CVE-2005-0036", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2005-0036", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2005-0036", "trust": 1.8, "value": "MEDIUM" }, { "author": "CARNEGIE MELLON", "id": "VU#23495", "trust": 0.8, "value": "41.92" }, { "author": "CNNVD", "id": "CNNVD-200512-967", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2005-0036", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CERT/CC", "id": "VU#23495" }, { "db": "VULMON", "id": "CVE-2005-0036" }, { "db": "JVNDB", "id": "JVNDB-2005-000343" }, { "db": "NVD", "id": "CVE-2005-0036" }, { "db": "CNNVD", "id": "CNNVD-200512-967" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The DNS implementation in DeleGate 8.10.2 and earlier allows remote attackers to cause a denial of service via a compressed DNS packet with a label length byte with an incorrect offset, which could trigger an infinite loop. Note that some other DNS packet processing systems have the issues related to this vulnerability. Multiple DNS vendors are susceptible to a remote denial-of-service vulnerability. This issue affects both DNS servers and clients. \nThis issue arises when an affected application handles a specially crafted DNS message. \nA successful attack would crash the affected client or server. \n\n----------------------------------------------------------------------\n\nBist Du interessiert an einem neuen Job in IT-Sicherheit?\n\n\nSecunia hat zwei freie Stellen als Junior und Senior Spezialist in IT-\nSicherheit:\nhttp://secunia.com/secunia_vacancies/\n\n----------------------------------------------------------------------\n\nTITLE:\nCisco Various Products Compressed DNS Messages Denial of Service\n\nSECUNIA ADVISORY ID:\nSA15472\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/15472/\n\nCRITICAL:\nLess critical\n\nIMPACT:\nDoS\n\nWHERE:\n\u003eFrom remote\n\nOPERATING SYSTEM:\nCisco ATA 180 Series Analog Telephone Adaptors\nhttp://secunia.com/product/2810/\n\nSOFTWARE:\nCisco IP Phone 7900 Series\nhttp://secunia.com/product/2809/\nCisco ACNS Software Version 5.x\nhttp://secunia.com/product/2268/\nCisco ACNS Software Version 4.x\nhttp://secunia.com/product/2269/\nCisco Unity Express 2.x\nhttp://secunia.com/product/5151/\n\nDESCRIPTION:\nA vulnerability has been reported in various Cisco products, which\ncan be exploited by malicious people to cause a DoS (Denial of\nService). \n\nSuccessful exploitation crashes a vulnerable device or causes it to\nfunction abnormally. \n\nThe vulnerability affects the following products:\n* Cisco IP Phones 7902/7905/7912\n* Cisco ATA (Analog Telephone Adaptor) 186/188\n* Cisco Unity Express\n\nThe following Cisco ACNS (Application and Content Networking System)\ndevices are also affected:\n* Cisco 500 Series Content Engines\n* Cisco 7300 Series Content Engines\n* Cisco Content Routers 4400 series\n* Cisco Content Distribution Manager 4600 series\n* Cisco Content Engine Module for Cisco 2600, 2800, 3600, 3700, and\n3800 series Integrated Service Routers. \n\nSOLUTION:\nSee patch matrix in vendor advisory for information about fixes. \nhttp://www.cisco.com/warp/public/707/cisco-sn-20050524-dns.shtml#software\n\nPROVIDED AND/OR DISCOVERED BY:\nNISCC credits Dr. Steve Beaty. \n\nORIGINAL ADVISORY:\nCisco:\nhttp://www.cisco.com/warp/public/707/cisco-sn-20050524-dns.shtml\n\nNISCC:\nhttp://www.niscc.gov.uk/niscc/docs/al-20050524-00433.html\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n", "sources": [ { "db": "NVD", "id": "CVE-2005-0036" }, { "db": "CERT/CC", "id": "VU#23495" }, { "db": "JVNDB", "id": "JVNDB-2005-000343" }, { "db": "BID", "id": "13729" }, { "db": "VULMON", "id": "CVE-2005-0036" }, { "db": "PACKETSTORM", "id": "37713" } ], "trust": 2.79 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "BID", "id": "13729", "trust": 3.6 }, { "db": "NVD", "id": "CVE-2005-0036", "trust": 2.8 }, { "db": "OSVDB", "id": "25291", "trust": 1.7 }, { "db": "SECUNIA", "id": "15472", "trust": 0.9 }, { "db": "SECTRACK", "id": "1014043", "trust": 0.8 }, { "db": "SECTRACK", "id": "1014044", "trust": 0.8 }, { "db": "SECTRACK", "id": "1014045", "trust": 0.8 }, { "db": "SECTRACK", "id": "1014046", "trust": 0.8 }, { "db": "BID", "id": "1165", "trust": 0.8 }, { "db": "CERT/CC", "id": "VU#23495", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2005-000343", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-200512-967", "trust": 0.6 }, { "db": "VULMON", "id": "CVE-2005-0036", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "37713", "trust": 0.1 } ], "sources": [ { "db": "CERT/CC", "id": "VU#23495" }, { "db": "VULMON", "id": "CVE-2005-0036" }, { "db": "BID", "id": "13729" }, { "db": "JVNDB", "id": "JVNDB-2005-000343" }, { "db": "PACKETSTORM", "id": "37713" }, { "db": "NVD", "id": "CVE-2005-0036" }, { "db": "CNNVD", "id": "CNNVD-200512-967" } ] }, "id": "VAR-200512-0640", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.37675563 }, "last_update_date": "2023-12-18T12:53:32.558000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Top Page", "trust": 0.8, "url": "http://www.delegate.org/delegate/" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2005-000343" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2005-0036" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.3, "url": "http://www.securityfocus.com/bid/13729" }, { "trust": 2.9, "url": "http://www.niscc.gov.uk/niscc/docs/al-20050524-00433.html" }, { "trust": 1.7, "url": "http://www.niscc.gov.uk/niscc/docs/re-20050524-00432.pdf?lang=en" }, { "trust": 1.7, "url": "http://www.osvdb.org/25291" }, { "trust": 1.2, "url": "http://www.cisco.com/warp/public/707/cisco-sn-20050524-dns.shtml" }, { "trust": 0.9, "url": "http://secunia.com/advisories/15472/" }, { "trust": 0.8, "url": "http://www.securityfocus.com/bid/1165" }, { "trust": 0.8, "url": "http://www.ciac.org/ciac/bulletins/l-015.shtml" }, { "trust": 0.8, "url": "http://www.securitytracker.com/id?1014046" }, { "trust": 0.8, "url": "http://www.securitytracker.com/id?1014045" }, { "trust": 0.8, "url": "http://www.securitytracker.com/id?1014044" }, { "trust": 0.8, "url": "http://www.securitytracker.com/id?1014043" }, { "trust": 0.8, "url": "http://www.ethereal.com" }, { "trust": 0.8, "url": "http://www.tcpdump.org" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2005-0036" }, { "trust": 0.8, "url": "http://www.cpni.gov.uk/products/vulnerabilitydisclosures/default.aspx?id=va-20050524-00432.xml" }, { "trust": 0.8, "url": "http://www.frsirt.com/english/advisories/2005/0610" }, { "trust": 0.8, "url": "http://jvn.jp/niscc/niscc-589088/index.html" }, { "trust": 0.8, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2005-0036" }, { "trust": 0.8, "url": "http://www.cpni.gov.uk/docs/re-20050524-00432.pdf?lang=en" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "http://tools.cisco.com/security/center/viewalert.x?alertid=9258" }, { "trust": 0.1, "url": "http://secunia.com/product/2810/" }, { "trust": 0.1, "url": "http://secunia.com/secunia_security_advisories/" }, { "trust": 0.1, "url": "http://secunia.com/about_secunia_advisories/" }, { "trust": 0.1, "url": "http://secunia.com/product/5151/" }, { "trust": 0.1, "url": "http://www.cisco.com/warp/public/707/cisco-sn-20050524-dns.shtml#software" }, { "trust": 0.1, "url": "http://secunia.com/secunia_vacancies/" }, { "trust": 0.1, "url": "http://secunia.com/product/2268/" }, { "trust": 0.1, "url": "http://secunia.com/product/2269/" }, { "trust": 0.1, "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org" }, { "trust": 0.1, "url": "http://secunia.com/product/2809/" } ], "sources": [ { "db": "CERT/CC", "id": "VU#23495" }, { "db": "VULMON", "id": "CVE-2005-0036" }, { "db": "BID", "id": "13729" }, { "db": "JVNDB", "id": "JVNDB-2005-000343" }, { "db": "PACKETSTORM", "id": "37713" }, { "db": "NVD", "id": "CVE-2005-0036" }, { "db": "CNNVD", "id": "CNNVD-200512-967" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CERT/CC", "id": "VU#23495" }, { "db": "VULMON", "id": "CVE-2005-0036" }, { "db": "BID", "id": "13729" }, { "db": "JVNDB", "id": "JVNDB-2005-000343" }, { "db": "PACKETSTORM", "id": "37713" }, { "db": "NVD", "id": "CVE-2005-0036" }, { "db": "CNNVD", "id": "CNNVD-200512-967" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2001-06-18T00:00:00", "db": "CERT/CC", "id": "VU#23495" }, { "date": "2005-12-31T00:00:00", "db": "VULMON", "id": "CVE-2005-0036" }, { "date": "2005-05-24T00:00:00", "db": "BID", "id": "13729" }, { "date": "2008-05-21T00:00:00", "db": "JVNDB", "id": "JVNDB-2005-000343" }, { "date": "2005-05-29T20:22:44", "db": "PACKETSTORM", "id": "37713" }, { "date": "2005-12-31T05:00:00", "db": "NVD", "id": "CVE-2005-0036" }, { "date": "2005-12-31T00:00:00", "db": "CNNVD", "id": "CNNVD-200512-967" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2005-11-15T00:00:00", "db": "CERT/CC", "id": "VU#23495" }, { "date": "2008-09-05T00:00:00", "db": "VULMON", "id": "CVE-2005-0036" }, { "date": "2016-07-06T14:40:00", "db": "BID", "id": "13729" }, { "date": "2008-05-21T00:00:00", "db": "JVNDB", "id": "JVNDB-2005-000343" }, { "date": "2008-09-05T20:45:07.777000", "db": "NVD", "id": "CVE-2005-0036" }, { "date": "2010-06-23T00:00:00", "db": "CNNVD", "id": "CNNVD-200512-967" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-200512-967" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "DNS implementations vulnerable to denial-of-service attacks via malformed DNS queries", "sources": [ { "db": "CERT/CC", "id": "VU#23495" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Design Error", "sources": [ { "db": "BID", "id": "13729" }, { "db": "CNNVD", "id": "CNNVD-200512-967" } ], "trust": 0.9 } }
var-200512-0641
Vulnerability from variot
The DNS implementation of DNRD before 2.10 allows remote attackers to cause a denial of service via a compressed DNS packet with a label length byte with an incorrect offset, which could trigger an infinite loop. Incorrect decoding of malformed DNS packets causes certain DNS implementations to hang or crash. Multiple DNS vendors are susceptible to a remote denial-of-service vulnerability. This issue affects both DNS servers and clients. This issue arises when an affected application handles a specially crafted DNS message. A successful attack would crash the affected client or server.
Bist Du interessiert an einem neuen Job in IT-Sicherheit?
Secunia hat zwei freie Stellen als Junior und Senior Spezialist in IT- Sicherheit: http://secunia.com/secunia_vacancies/
TITLE: Cisco Various Products Compressed DNS Messages Denial of Service
SECUNIA ADVISORY ID: SA15472
VERIFY ADVISORY: http://secunia.com/advisories/15472/
CRITICAL: Less critical
IMPACT: DoS
WHERE:
From remote
OPERATING SYSTEM: Cisco ATA 180 Series Analog Telephone Adaptors http://secunia.com/product/2810/
SOFTWARE: Cisco IP Phone 7900 Series http://secunia.com/product/2809/ Cisco ACNS Software Version 5.x http://secunia.com/product/2268/ Cisco ACNS Software Version 4.x http://secunia.com/product/2269/ Cisco Unity Express 2.x http://secunia.com/product/5151/
DESCRIPTION: A vulnerability has been reported in various Cisco products, which can be exploited by malicious people to cause a DoS (Denial of Service).
The vulnerability is caused due to an error in the DNS implementation during the decompression of compressed DNS messages and can be exploited via a specially crafted DNS packet containing invalid information in the compressed section.
Successful exploitation crashes a vulnerable device or causes it to function abnormally.
The vulnerability affects the following products: * Cisco IP Phones 7902/7905/7912 * Cisco ATA (Analog Telephone Adaptor) 186/188 * Cisco Unity Express
The following Cisco ACNS (Application and Content Networking System) devices are also affected: * Cisco 500 Series Content Engines * Cisco 7300 Series Content Engines * Cisco Content Routers 4400 series * Cisco Content Distribution Manager 4600 series * Cisco Content Engine Module for Cisco 2600, 2800, 3600, 3700, and 3800 series Integrated Service Routers.
SOLUTION: See patch matrix in vendor advisory for information about fixes. http://www.cisco.com/warp/public/707/cisco-sn-20050524-dns.shtml#software
PROVIDED AND/OR DISCOVERED BY: NISCC credits Dr. Steve Beaty.
ORIGINAL ADVISORY: Cisco: http://www.cisco.com/warp/public/707/cisco-sn-20050524-dns.shtml
NISCC: http://www.niscc.gov.uk/niscc/docs/al-20050524-00433.html
About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
Show details on source website
{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200512-0641", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "dnrd", "scope": "eq", "trust": 1.9, "vendor": "dnrd", "version": "2.9" }, { "model": "dnrd", "scope": "eq", "trust": 1.9, "vendor": "dnrd", "version": "2.8" }, { "model": "dnrd", "scope": "eq", "trust": 1.9, "vendor": "dnrd", "version": "2.7" }, { "model": "dnrd", "scope": "eq", "trust": 1.9, "vendor": "dnrd", "version": "2.6" }, { "model": "dnrd", "scope": "eq", "trust": 1.9, "vendor": "dnrd", "version": "2.5" }, { "model": "dnrd", "scope": "eq", "trust": 1.9, "vendor": "dnrd", "version": "2.4" }, { "model": "dnrd", "scope": "eq", "trust": 1.9, "vendor": "dnrd", "version": "2.3" }, { "model": "dnrd", "scope": "eq", "trust": 1.9, "vendor": "dnrd", "version": "2.2" }, { "model": "dnrd", "scope": "eq", "trust": 1.9, "vendor": "dnrd", "version": "2.1" }, { "model": "dnrd", "scope": "eq", "trust": 1.9, "vendor": "dnrd", "version": "2.0" }, { "model": "dnrd", "scope": "eq", "trust": 1.3, "vendor": "dnrd", "version": "1.4" }, { "model": "dnrd", "scope": "eq", "trust": 1.3, "vendor": "dnrd", "version": "1.3" }, { "model": "dnrd", "scope": "eq", "trust": 1.3, "vendor": "dnrd", "version": "1.2" }, { "model": "dnrd", "scope": "eq", "trust": 1.3, "vendor": "dnrd", "version": "1.1" }, { "model": "dnrd", "scope": "eq", "trust": 1.3, "vendor": "dnrd", "version": "1.0" }, { "model": null, "scope": null, "trust": 0.8, "vendor": "ethereal", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "tcpdump", "version": null }, { "model": "application \u0026 content networking software", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "powerdns", "scope": "eq", "trust": 0.3, "vendor": "powerdns", "version": "2.9.16" }, { "model": "powerdns", "scope": "eq", "trust": 0.3, "vendor": "powerdns", "version": "2.9.15" }, { "model": "powerdns", "scope": "eq", "trust": 0.3, "vendor": "powerdns", "version": "2.8" }, { "model": "rc1", "scope": "eq", "trust": 0.3, "vendor": "powerdns", "version": "2.0" }, { "model": "dnrd", "scope": "eq", "trust": 0.3, "vendor": "dnrd", "version": "2.10" }, { "model": "delegate", "scope": "eq", "trust": 0.3, "vendor": "delegate", "version": "8.10.2" }, { "model": "delegate", "scope": "eq", "trust": 0.3, "vendor": "delegate", "version": "8.10.1" }, { "model": "delegate", "scope": "eq", "trust": 0.3, "vendor": "delegate", "version": "8.10" }, { "model": "delegate", "scope": "eq", "trust": 0.3, "vendor": "delegate", "version": "8.9.6" }, { "model": "delegate", "scope": "eq", "trust": 0.3, "vendor": "delegate", "version": "8.9.5" }, { "model": "delegate", "scope": "eq", "trust": 0.3, "vendor": "delegate", "version": "8.9.4" }, { "model": "delegate", "scope": "eq", "trust": 0.3, "vendor": "delegate", "version": "8.9.3" }, { "model": "delegate", "scope": "eq", "trust": 0.3, "vendor": "delegate", "version": "8.9.2" }, { "model": "delegate", "scope": "eq", "trust": 0.3, "vendor": "delegate", "version": "8.9.1" }, { "model": "delegate", "scope": "eq", "trust": 0.3, "vendor": "delegate", "version": "8.9" }, { "model": "delegate", "scope": "eq", "trust": 0.3, "vendor": "delegate", "version": "8.5.0" }, { "model": "delegate", "scope": "eq", "trust": 0.3, "vendor": "delegate", "version": "8.4.0" }, { "model": "delegate", "scope": "eq", "trust": 0.3, "vendor": "delegate", "version": "8.3.4" }, { "model": "delegate", "scope": "eq", "trust": 0.3, "vendor": "delegate", "version": "8.3.3" }, { "model": "delegate", "scope": "eq", "trust": 0.3, "vendor": "delegate", "version": "7.9.11" }, { "model": "delegate", "scope": "eq", "trust": 0.3, "vendor": "delegate", "version": "7.8.2" }, { "model": "delegate", "scope": "eq", "trust": 0.3, "vendor": "delegate", "version": "7.8.1" }, { "model": "delegate", "scope": "eq", "trust": 0.3, "vendor": "delegate", "version": "7.8.0" }, { "model": "delegate", "scope": "eq", "trust": 0.3, "vendor": "delegate", "version": "7.7.1" }, { "model": "delegate", "scope": "eq", "trust": 0.3, "vendor": "delegate", "version": "7.7.0" }, { "model": "unity express", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "subscriber edge services manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.3(1)" }, { "model": "subscriber edge services manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.2(2)" }, { "model": "subscriber edge services manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.2(1)" }, { "model": "ip phone", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "79120" }, { "model": "ip phone", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7905" }, { "model": "ip phone", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7902" }, { "model": "content router", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4450" }, { "model": "content router", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "44304.1" }, { "model": "content router", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "44304.0" }, { "model": "content router", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4430" }, { "model": "content engine module for cisco router series", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3800" }, { "model": "content engine module for cisco router series", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3700" }, { "model": "content engine module for cisco router series", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3600" }, { "model": "content engine module for cisco router series", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2800" }, { "model": "content engine module for cisco router series", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2600" }, { "model": "content engine", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7325" }, { "model": "content engine", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "73204.1" }, { "model": "content engine", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "73204.0" }, { "model": "content engine", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "73203.1" }, { "model": "content engine", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "73202.2.0" }, { "model": "content engine", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7320" }, { "model": "content engine", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5904.1" }, { "model": "content engine", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5904.0" }, { "model": "content engine", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5903.1" }, { "model": "content engine", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5902.2.0" }, { "model": "content engine", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "590" }, { "model": "content engine", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "565" }, { "model": "content engine", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5604.1" }, { "model": "content engine", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5604.0" }, { "model": "content engine", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5603.1" }, { "model": "content engine", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5602.2.0" }, { "model": "content engine", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "560" }, { "model": "content engine", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "510" }, { "model": "content engine", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5074.1" }, { "model": "content engine", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5074.0" }, { "model": "content engine", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5073.1" }, { "model": "content engine", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5072.2.0" }, { "model": "content engine", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "507" }, { "model": "content distribution manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4670" }, { "model": "content distribution manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "46504.1" }, { "model": "content distribution manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "46504.0" }, { "model": "content distribution manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4650" }, { "model": "content distribution manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "46304.1" }, { "model": "content distribution manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "46304.0" }, { "model": "content distribution manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4630" }, { "model": "ata-188", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ata-186", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "application \u0026 content networking software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.2.3.9" }, { "model": "application \u0026 content networking software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.2.1.7" }, { "model": "application \u0026 content networking software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.2" }, { "model": "application \u0026 content networking software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.1.13.7" }, { "model": "application \u0026 content networking software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.1.11.6" }, { "model": "application \u0026 content networking software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.1" }, { "model": "application \u0026 content networking software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.0.17.6" }, { "model": "application \u0026 content networking software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.0.5" }, { "model": "application \u0026 content networking software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.0.3" }, { "model": "application \u0026 content networking software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.0.1" }, { "model": "application \u0026 content networking software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.0" }, { "model": "application \u0026 content networking software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.2.11" }, { "model": "application \u0026 content networking software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.2.9" }, { "model": "application \u0026 content networking software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.2.7" }, { "model": "application \u0026 content networking software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.2" }, { "model": "application \u0026 content networking software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.1.3" }, { "model": "application \u0026 content networking software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.1.1" }, { "model": "application \u0026 content networking software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0.3" }, { "model": "powerdns", "scope": "ne", "trust": 0.3, "vendor": "powerdns", "version": "2.9.17" }, { "model": "dnrd", "scope": "ne", "trust": 0.3, "vendor": "dnrd", "version": "2.18" }, { "model": "delegate", "scope": "ne", "trust": 0.3, "vendor": "delegate", "version": "8.11.1" }, { "model": "delegate", "scope": "ne", "trust": 0.3, "vendor": "delegate", "version": "8.11" }, { "model": "delegate", "scope": "ne", "trust": 0.3, "vendor": "delegate", "version": "8.10.6" }, { "model": "delegate", "scope": "ne", "trust": 0.3, "vendor": "delegate", "version": "8.10.5" }, { "model": "delegate", "scope": "ne", "trust": 0.3, "vendor": "delegate", "version": "8.10.4" }, { "model": "delegate", "scope": "ne", "trust": 0.3, "vendor": "delegate", "version": "8.10.3" }, { "model": "subscriber edge services manager", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "3.3(2)" }, { "model": "application \u0026 content networking software", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "5.3.3" }, { "model": "application \u0026 content networking software", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "5.2.7" }, { "model": "application \u0026 content networking software", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "5.1.15" } ], "sources": [ { "db": "CERT/CC", "id": "VU#23495" }, { "db": "BID", "id": "13729" }, { "db": "NVD", "id": "CVE-2005-0037" }, { "db": "CNNVD", "id": "CNNVD-200512-731" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:dnrd:dnrd:1.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:dnrd:dnrd:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:dnrd:dnrd:2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:dnrd:dnrd:2.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:dnrd:dnrd:1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:dnrd:dnrd:1.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:dnrd:dnrd:2.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:dnrd:dnrd:2.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:dnrd:dnrd:2.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:dnrd:dnrd:2.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:dnrd:dnrd:2.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:dnrd:dnrd:1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:dnrd:dnrd:1.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:dnrd:dnrd:2.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:dnrd:dnrd:2.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2005-0037" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Discovered by Dr. Steve Beaty from the Department of Mathematical and Computer Sciences at the Metropolitan State College of Denver.", "sources": [ { "db": "BID", "id": "13729" }, { "db": "CNNVD", "id": "CNNVD-200512-731" } ], "trust": 0.9 }, "cve": "CVE-2005-0037", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2005-0037", "trust": 1.0, "value": "MEDIUM" }, { "author": "CARNEGIE MELLON", "id": "VU#23495", "trust": 0.8, "value": "41.92" }, { "author": "CNNVD", "id": "CNNVD-200512-731", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CERT/CC", "id": "VU#23495" }, { "db": "NVD", "id": "CVE-2005-0037" }, { "db": "CNNVD", "id": "CNNVD-200512-731" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The DNS implementation of DNRD before 2.10 allows remote attackers to cause a denial of service via a compressed DNS packet with a label length byte with an incorrect offset, which could trigger an infinite loop. Incorrect decoding of malformed DNS packets causes certain DNS implementations to hang or crash. Multiple DNS vendors are susceptible to a remote denial-of-service vulnerability. This issue affects both DNS servers and clients. \nThis issue arises when an affected application handles a specially crafted DNS message. \nA successful attack would crash the affected client or server. \n\n----------------------------------------------------------------------\n\nBist Du interessiert an einem neuen Job in IT-Sicherheit?\n\n\nSecunia hat zwei freie Stellen als Junior und Senior Spezialist in IT-\nSicherheit:\nhttp://secunia.com/secunia_vacancies/\n\n----------------------------------------------------------------------\n\nTITLE:\nCisco Various Products Compressed DNS Messages Denial of Service\n\nSECUNIA ADVISORY ID:\nSA15472\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/15472/\n\nCRITICAL:\nLess critical\n\nIMPACT:\nDoS\n\nWHERE:\n\u003eFrom remote\n\nOPERATING SYSTEM:\nCisco ATA 180 Series Analog Telephone Adaptors\nhttp://secunia.com/product/2810/\n\nSOFTWARE:\nCisco IP Phone 7900 Series\nhttp://secunia.com/product/2809/\nCisco ACNS Software Version 5.x\nhttp://secunia.com/product/2268/\nCisco ACNS Software Version 4.x\nhttp://secunia.com/product/2269/\nCisco Unity Express 2.x\nhttp://secunia.com/product/5151/\n\nDESCRIPTION:\nA vulnerability has been reported in various Cisco products, which\ncan be exploited by malicious people to cause a DoS (Denial of\nService). \n\nThe vulnerability is caused due to an error in the DNS implementation\nduring the decompression of compressed DNS messages and can be\nexploited via a specially crafted DNS packet containing invalid\ninformation in the compressed section. \n\nSuccessful exploitation crashes a vulnerable device or causes it to\nfunction abnormally. \n\nThe vulnerability affects the following products:\n* Cisco IP Phones 7902/7905/7912\n* Cisco ATA (Analog Telephone Adaptor) 186/188\n* Cisco Unity Express\n\nThe following Cisco ACNS (Application and Content Networking System)\ndevices are also affected:\n* Cisco 500 Series Content Engines\n* Cisco 7300 Series Content Engines\n* Cisco Content Routers 4400 series\n* Cisco Content Distribution Manager 4600 series\n* Cisco Content Engine Module for Cisco 2600, 2800, 3600, 3700, and\n3800 series Integrated Service Routers. \n\nSOLUTION:\nSee patch matrix in vendor advisory for information about fixes. \nhttp://www.cisco.com/warp/public/707/cisco-sn-20050524-dns.shtml#software\n\nPROVIDED AND/OR DISCOVERED BY:\nNISCC credits Dr. Steve Beaty. \n\nORIGINAL ADVISORY:\nCisco:\nhttp://www.cisco.com/warp/public/707/cisco-sn-20050524-dns.shtml\n\nNISCC:\nhttp://www.niscc.gov.uk/niscc/docs/al-20050524-00433.html\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n", "sources": [ { "db": "NVD", "id": "CVE-2005-0037" }, { "db": "CERT/CC", "id": "VU#23495" }, { "db": "BID", "id": "13729" }, { "db": "PACKETSTORM", "id": "37713" } ], "trust": 1.98 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "BID", "id": "13729", "trust": 2.7 }, { "db": "NVD", "id": "CVE-2005-0037", "trust": 1.9 }, { "db": "OSVDB", "id": "25291", "trust": 1.6 }, { "db": "SECUNIA", "id": "15472", "trust": 0.9 }, { "db": "SECTRACK", "id": "1014043", "trust": 0.8 }, { "db": "SECTRACK", "id": "1014044", "trust": 0.8 }, { "db": "SECTRACK", "id": "1014045", "trust": 0.8 }, { "db": "SECTRACK", "id": "1014046", "trust": 0.8 }, { "db": "BID", "id": "1165", "trust": 0.8 }, { "db": "CERT/CC", "id": "VU#23495", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-200512-731", "trust": 0.6 }, { "db": "PACKETSTORM", "id": "37713", "trust": 0.1 } ], "sources": [ { "db": "CERT/CC", "id": "VU#23495" }, { "db": "BID", "id": "13729" }, { "db": "PACKETSTORM", "id": "37713" }, { "db": "NVD", "id": "CVE-2005-0037" }, { "db": "CNNVD", "id": "CNNVD-200512-731" } ] }, "id": "VAR-200512-0641", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.37675563 }, "last_update_date": "2023-12-18T12:53:32.469000Z", "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2005-0037" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.8, "url": "http://www.niscc.gov.uk/niscc/docs/al-20050524-00433.html" }, { "trust": 2.4, "url": "http://www.securityfocus.com/bid/13729" }, { "trust": 1.6, "url": "http://www.niscc.gov.uk/niscc/docs/re-20050524-00432.pdf?lang=en" }, { "trust": 1.6, "url": "http://www.osvdb.org/25291" }, { "trust": 1.2, "url": "http://www.cisco.com/warp/public/707/cisco-sn-20050524-dns.shtml" }, { "trust": 0.9, "url": "http://secunia.com/advisories/15472/" }, { "trust": 0.8, "url": "http://www.securityfocus.com/bid/1165" }, { "trust": 0.8, "url": "http://www.ciac.org/ciac/bulletins/l-015.shtml" }, { "trust": 0.8, "url": "http://www.securitytracker.com/id?1014046" }, { "trust": 0.8, "url": "http://www.securitytracker.com/id?1014045" }, { "trust": 0.8, "url": "http://www.securitytracker.com/id?1014044" }, { "trust": 0.8, "url": "http://www.securitytracker.com/id?1014043" }, { "trust": 0.8, "url": "http://www.ethereal.com" }, { "trust": 0.8, "url": "http://www.tcpdump.org" }, { "trust": 0.1, "url": "http://secunia.com/product/2810/" }, { "trust": 0.1, "url": "http://secunia.com/secunia_security_advisories/" }, { "trust": 0.1, "url": "http://secunia.com/about_secunia_advisories/" }, { "trust": 0.1, "url": "http://secunia.com/product/5151/" }, { "trust": 0.1, "url": "http://www.cisco.com/warp/public/707/cisco-sn-20050524-dns.shtml#software" }, { "trust": 0.1, "url": "http://secunia.com/secunia_vacancies/" }, { "trust": 0.1, "url": "http://secunia.com/product/2268/" }, { "trust": 0.1, "url": "http://secunia.com/product/2269/" }, { "trust": 0.1, "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org" }, { "trust": 0.1, "url": "http://secunia.com/product/2809/" } ], "sources": [ { "db": "CERT/CC", "id": "VU#23495" }, { "db": "BID", "id": "13729" }, { "db": "PACKETSTORM", "id": "37713" }, { "db": "NVD", "id": "CVE-2005-0037" }, { "db": "CNNVD", "id": "CNNVD-200512-731" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CERT/CC", "id": "VU#23495" }, { "db": "BID", "id": "13729" }, { "db": "PACKETSTORM", "id": "37713" }, { "db": "NVD", "id": "CVE-2005-0037" }, { "db": "CNNVD", "id": "CNNVD-200512-731" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2001-06-18T00:00:00", "db": "CERT/CC", "id": "VU#23495" }, { "date": "2005-05-24T00:00:00", "db": "BID", "id": "13729" }, { "date": "2005-05-29T20:22:44", "db": "PACKETSTORM", "id": "37713" }, { "date": "2005-12-31T05:00:00", "db": "NVD", "id": "CVE-2005-0037" }, { "date": "2005-12-31T00:00:00", "db": "CNNVD", "id": "CNNVD-200512-731" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2005-11-15T00:00:00", "db": "CERT/CC", "id": "VU#23495" }, { "date": "2016-07-06T14:40:00", "db": "BID", "id": "13729" }, { "date": "2008-09-05T20:45:08.060000", "db": "NVD", "id": "CVE-2005-0037" }, { "date": "2010-06-23T00:00:00", "db": "CNNVD", "id": "CNNVD-200512-731" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-200512-731" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "DNS implementations vulnerable to denial-of-service attacks via malformed DNS queries", "sources": [ { "db": "CERT/CC", "id": "VU#23495" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Design Error", "sources": [ { "db": "BID", "id": "13729" }, { "db": "CNNVD", "id": "CNNVD-200512-731" } ], "trust": 0.9 } }
var-200512-0860
Vulnerability from variot
Cisco IP Phones 7902/7905/7912, ATA 186/188, Unity Express, ACNS, and Subscriber Edge Services Manager (SESM) allows remote attackers to cause a denial of service (crash or instability) via a compressed DNS packet with a label length byte with an incorrect offset. Incorrect decoding of malformed DNS packets causes certain DNS implementations to hang or crash. Multiple DNS vendors are susceptible to a remote denial-of-service vulnerability. This issue affects both DNS servers and clients. This issue arises when an affected application handles a specially crafted DNS message. A successful attack would crash the affected client or server.
Bist Du interessiert an einem neuen Job in IT-Sicherheit?
Secunia hat zwei freie Stellen als Junior und Senior Spezialist in IT- Sicherheit: http://secunia.com/secunia_vacancies/
TITLE: Cisco Various Products Compressed DNS Messages Denial of Service
SECUNIA ADVISORY ID: SA15472
VERIFY ADVISORY: http://secunia.com/advisories/15472/
CRITICAL: Less critical
IMPACT: DoS
WHERE:
From remote
OPERATING SYSTEM: Cisco ATA 180 Series Analog Telephone Adaptors http://secunia.com/product/2810/
SOFTWARE: Cisco IP Phone 7900 Series http://secunia.com/product/2809/ Cisco ACNS Software Version 5.x http://secunia.com/product/2268/ Cisco ACNS Software Version 4.x http://secunia.com/product/2269/ Cisco Unity Express 2.x http://secunia.com/product/5151/
DESCRIPTION: A vulnerability has been reported in various Cisco products, which can be exploited by malicious people to cause a DoS (Denial of Service).
The vulnerability is caused due to an error in the DNS implementation during the decompression of compressed DNS messages and can be exploited via a specially crafted DNS packet containing invalid information in the compressed section.
Successful exploitation crashes a vulnerable device or causes it to function abnormally.
The vulnerability affects the following products: * Cisco IP Phones 7902/7905/7912 * Cisco ATA (Analog Telephone Adaptor) 186/188 * Cisco Unity Express
The following Cisco ACNS (Application and Content Networking System) devices are also affected: * Cisco 500 Series Content Engines * Cisco 7300 Series Content Engines * Cisco Content Routers 4400 series * Cisco Content Distribution Manager 4600 series * Cisco Content Engine Module for Cisco 2600, 2800, 3600, 3700, and 3800 series Integrated Service Routers.
SOLUTION: See patch matrix in vendor advisory for information about fixes. http://www.cisco.com/warp/public/707/cisco-sn-20050524-dns.shtml#software
PROVIDED AND/OR DISCOVERED BY: NISCC credits Dr. Steve Beaty.
ORIGINAL ADVISORY: Cisco: http://www.cisco.com/warp/public/707/cisco-sn-20050524-dns.shtml
NISCC: http://www.niscc.gov.uk/niscc/docs/al-20050524-00433.html
About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
Show details on source website
{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200512-0860", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "ata", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "186" }, { "model": "ata", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "188" }, { "model": "ip phone 7912", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "*" }, { "model": "ip phone 7902", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "*" }, { "model": "unity express", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "*" }, { "model": "subscriber edge services manager", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "*" }, { "model": "application and content networking software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "*" }, { "model": "ip phone 7905", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "*" }, { "model": "unity express", "scope": null, "trust": 0.9, "vendor": "cisco", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "ethereal", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "tcpdump", "version": null }, { "model": "application \u0026 content networking software", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "subscriber edge services manager", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "ip phone 7902", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "application and content networking software", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "ip phone 7905", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "ip phone 7912", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "powerdns", "scope": "eq", "trust": 0.3, "vendor": "powerdns", "version": "2.9.16" }, { "model": "powerdns", "scope": "eq", "trust": 0.3, "vendor": "powerdns", "version": "2.9.15" }, { "model": "powerdns", "scope": "eq", "trust": 0.3, "vendor": "powerdns", "version": "2.8" }, { "model": "rc1", "scope": "eq", "trust": 0.3, "vendor": "powerdns", "version": "2.0" }, { "model": "dnrd", "scope": "eq", "trust": 0.3, "vendor": "dnrd", "version": "2.10" }, { "model": "dnrd", "scope": "eq", "trust": 0.3, "vendor": "dnrd", "version": "2.9" }, { "model": "dnrd", "scope": "eq", "trust": 0.3, "vendor": "dnrd", "version": "2.8" }, { "model": "dnrd", "scope": "eq", "trust": 0.3, "vendor": "dnrd", "version": "2.7" }, { "model": "dnrd", "scope": "eq", "trust": 0.3, "vendor": "dnrd", "version": "2.6" }, { "model": "dnrd", "scope": "eq", "trust": 0.3, "vendor": "dnrd", "version": "2.5" }, { "model": "dnrd", "scope": "eq", "trust": 0.3, "vendor": "dnrd", "version": "2.4" }, { "model": "dnrd", "scope": "eq", "trust": 0.3, "vendor": "dnrd", "version": "2.3" }, { "model": "dnrd", "scope": "eq", "trust": 0.3, "vendor": "dnrd", "version": "2.2" }, { "model": "dnrd", "scope": "eq", "trust": 0.3, "vendor": "dnrd", "version": "2.1" }, { "model": "dnrd", "scope": "eq", "trust": 0.3, "vendor": "dnrd", "version": "2.0" }, { "model": "dnrd", "scope": "eq", "trust": 0.3, "vendor": "dnrd", "version": "1.4" }, { "model": "dnrd", "scope": "eq", "trust": 0.3, "vendor": "dnrd", "version": "1.3" }, { "model": "dnrd", "scope": "eq", "trust": 0.3, "vendor": "dnrd", "version": "1.2" }, { "model": "dnrd", "scope": "eq", "trust": 0.3, "vendor": "dnrd", "version": "1.1" }, { "model": "dnrd", "scope": "eq", "trust": 0.3, "vendor": "dnrd", "version": "1.0" }, { "model": "delegate", "scope": "eq", "trust": 0.3, "vendor": "delegate", "version": "8.10.2" }, { "model": "delegate", "scope": "eq", "trust": 0.3, "vendor": "delegate", "version": "8.10.1" }, { "model": "delegate", "scope": "eq", "trust": 0.3, "vendor": "delegate", "version": "8.10" }, { "model": "delegate", "scope": "eq", "trust": 0.3, "vendor": "delegate", "version": "8.9.6" }, { "model": "delegate", "scope": "eq", "trust": 0.3, "vendor": "delegate", "version": "8.9.5" }, { "model": "delegate", "scope": "eq", "trust": 0.3, "vendor": "delegate", "version": "8.9.4" }, { "model": "delegate", "scope": "eq", "trust": 0.3, "vendor": "delegate", "version": "8.9.3" }, { "model": "delegate", "scope": "eq", "trust": 0.3, "vendor": "delegate", "version": "8.9.2" }, { "model": "delegate", "scope": "eq", "trust": 0.3, "vendor": "delegate", "version": "8.9.1" }, { "model": "delegate", "scope": "eq", "trust": 0.3, "vendor": "delegate", "version": "8.9" }, { "model": "delegate", "scope": "eq", "trust": 0.3, "vendor": "delegate", "version": "8.5.0" }, { "model": "delegate", "scope": "eq", "trust": 0.3, "vendor": "delegate", "version": "8.4.0" }, { "model": "delegate", "scope": "eq", "trust": 0.3, "vendor": "delegate", "version": "8.3.4" }, { "model": "delegate", "scope": "eq", "trust": 0.3, "vendor": "delegate", "version": "8.3.3" }, { "model": "delegate", "scope": "eq", "trust": 0.3, "vendor": "delegate", "version": "7.9.11" }, { "model": "delegate", "scope": "eq", "trust": 0.3, "vendor": "delegate", "version": "7.8.2" }, { "model": "delegate", "scope": "eq", "trust": 0.3, "vendor": "delegate", "version": "7.8.1" }, { "model": "delegate", "scope": "eq", "trust": 0.3, "vendor": "delegate", "version": "7.8.0" }, { "model": "delegate", "scope": "eq", "trust": 0.3, "vendor": "delegate", "version": "7.7.1" }, { "model": "delegate", "scope": "eq", "trust": 0.3, "vendor": "delegate", "version": "7.7.0" }, { "model": "subscriber edge services manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.3(1)" }, { "model": "subscriber edge services manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.2(2)" }, { "model": "subscriber edge services manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.2(1)" }, { "model": "ip phone", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "79120" }, { "model": "ip phone", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7905" }, { "model": "ip phone", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7902" }, { "model": "content router", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4450" }, { "model": "content router", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "44304.1" }, { "model": "content router", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "44304.0" }, { "model": "content router", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4430" }, { "model": "content engine module for cisco router series", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3800" }, { "model": "content engine module for cisco router series", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3700" }, { "model": "content engine module for cisco router series", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3600" }, { "model": "content engine module for cisco router series", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2800" }, { "model": "content engine module for cisco router series", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2600" }, { "model": "content engine", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7325" }, { "model": "content engine", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "73204.1" }, { "model": "content engine", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "73204.0" }, { "model": "content engine", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "73203.1" }, { "model": "content engine", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "73202.2.0" }, { "model": "content engine", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7320" }, { "model": "content engine", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5904.1" }, { "model": "content engine", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5904.0" }, { "model": "content engine", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5903.1" }, { "model": "content engine", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5902.2.0" }, { "model": "content engine", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "590" }, { "model": "content engine", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "565" }, { "model": "content engine", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5604.1" }, { "model": "content engine", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5604.0" }, { "model": "content engine", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5603.1" }, { "model": "content engine", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5602.2.0" }, { "model": "content engine", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "560" }, { "model": "content engine", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "510" }, { "model": "content engine", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5074.1" }, { "model": "content engine", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5074.0" }, { "model": "content engine", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5073.1" }, { "model": "content engine", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5072.2.0" }, { "model": "content engine", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "507" }, { "model": "content distribution manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4670" }, { "model": "content distribution manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "46504.1" }, { "model": "content distribution manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "46504.0" }, { "model": "content distribution manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4650" }, { "model": "content distribution manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "46304.1" }, { "model": "content distribution manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "46304.0" }, { "model": "content distribution manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4630" }, { "model": "ata-188", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ata-186", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "application \u0026 content networking software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.2.3.9" }, { "model": "application \u0026 content networking software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.2.1.7" }, { "model": "application \u0026 content networking software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.2" }, { "model": "application \u0026 content networking software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.1.13.7" }, { "model": "application \u0026 content networking software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.1.11.6" }, { "model": "application \u0026 content networking software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.1" }, { "model": "application \u0026 content networking software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.0.17.6" }, { "model": "application \u0026 content networking software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.0.5" }, { "model": "application \u0026 content networking software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.0.3" }, { "model": "application \u0026 content networking software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.0.1" }, { "model": "application \u0026 content networking software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.0" }, { "model": "application \u0026 content networking software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.2.11" }, { "model": "application \u0026 content networking software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.2.9" }, { "model": "application \u0026 content networking software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.2.7" }, { "model": "application \u0026 content networking software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.2" }, { "model": "application \u0026 content networking software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.1.3" }, { "model": "application \u0026 content networking software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.1.1" }, { "model": "application \u0026 content networking software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0.3" }, { "model": "powerdns", "scope": "ne", "trust": 0.3, "vendor": "powerdns", "version": "2.9.17" }, { "model": "dnrd", "scope": "ne", "trust": 0.3, "vendor": "dnrd", "version": "2.18" }, { "model": "delegate", "scope": "ne", "trust": 0.3, "vendor": "delegate", "version": "8.11.1" }, { "model": "delegate", "scope": "ne", "trust": 0.3, "vendor": "delegate", "version": "8.11" }, { "model": "delegate", "scope": "ne", "trust": 0.3, "vendor": "delegate", "version": "8.10.6" }, { "model": "delegate", "scope": "ne", "trust": 0.3, "vendor": "delegate", "version": "8.10.5" }, { "model": "delegate", "scope": "ne", "trust": 0.3, "vendor": "delegate", "version": "8.10.4" }, { "model": "delegate", "scope": "ne", "trust": 0.3, "vendor": "delegate", "version": "8.10.3" }, { "model": "subscriber edge services manager", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "3.3(2)" }, { "model": "application \u0026 content networking software", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "5.3.3" }, { "model": "application \u0026 content networking software", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "5.2.7" }, { "model": "application \u0026 content networking software", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "5.1.15" } ], "sources": [ { "db": "CERT/CC", "id": "VU#23495" }, { "db": "BID", "id": "13729" }, { "db": "NVD", "id": "CVE-2005-4794" }, { "db": "CNNVD", "id": "CNNVD-200512-642" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:ip_phone_7905:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:cisco:ip_phone_7912:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:cisco:unity_express:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:application_and_content_networking_software:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:ata:186:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:ata:188:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:subscriber_edge_services_manager:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:cisco:ip_phone_7902:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2005-4794" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Discovered by Dr. Steve Beaty from the Department of Mathematical and Computer Sciences at the Metropolitan State College of Denver.", "sources": [ { "db": "BID", "id": "13729" }, { "db": "CNNVD", "id": "CNNVD-200512-642" } ], "trust": 0.9 }, "cve": "CVE-2005-4794", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-16002", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2005-4794", "trust": 1.0, "value": "MEDIUM" }, { "author": "CARNEGIE MELLON", "id": "VU#23495", "trust": 0.8, "value": "41.92" }, { "author": "CNNVD", "id": "CNNVD-200512-642", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-16002", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CERT/CC", "id": "VU#23495" }, { "db": "VULHUB", "id": "VHN-16002" }, { "db": "NVD", "id": "CVE-2005-4794" }, { "db": "CNNVD", "id": "CNNVD-200512-642" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco IP Phones 7902/7905/7912, ATA 186/188, Unity Express, ACNS, and Subscriber Edge Services Manager (SESM) allows remote attackers to cause a denial of service (crash or instability) via a compressed DNS packet with a label length byte with an incorrect offset. Incorrect decoding of malformed DNS packets causes certain DNS implementations to hang or crash. Multiple DNS vendors are susceptible to a remote denial-of-service vulnerability. This issue affects both DNS servers and clients. \nThis issue arises when an affected application handles a specially crafted DNS message. \nA successful attack would crash the affected client or server. \n\n----------------------------------------------------------------------\n\nBist Du interessiert an einem neuen Job in IT-Sicherheit?\n\n\nSecunia hat zwei freie Stellen als Junior und Senior Spezialist in IT-\nSicherheit:\nhttp://secunia.com/secunia_vacancies/\n\n----------------------------------------------------------------------\n\nTITLE:\nCisco Various Products Compressed DNS Messages Denial of Service\n\nSECUNIA ADVISORY ID:\nSA15472\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/15472/\n\nCRITICAL:\nLess critical\n\nIMPACT:\nDoS\n\nWHERE:\n\u003eFrom remote\n\nOPERATING SYSTEM:\nCisco ATA 180 Series Analog Telephone Adaptors\nhttp://secunia.com/product/2810/\n\nSOFTWARE:\nCisco IP Phone 7900 Series\nhttp://secunia.com/product/2809/\nCisco ACNS Software Version 5.x\nhttp://secunia.com/product/2268/\nCisco ACNS Software Version 4.x\nhttp://secunia.com/product/2269/\nCisco Unity Express 2.x\nhttp://secunia.com/product/5151/\n\nDESCRIPTION:\nA vulnerability has been reported in various Cisco products, which\ncan be exploited by malicious people to cause a DoS (Denial of\nService). \n\nThe vulnerability is caused due to an error in the DNS implementation\nduring the decompression of compressed DNS messages and can be\nexploited via a specially crafted DNS packet containing invalid\ninformation in the compressed section. \n\nSuccessful exploitation crashes a vulnerable device or causes it to\nfunction abnormally. \n\nThe vulnerability affects the following products:\n* Cisco IP Phones 7902/7905/7912\n* Cisco ATA (Analog Telephone Adaptor) 186/188\n* Cisco Unity Express\n\nThe following Cisco ACNS (Application and Content Networking System)\ndevices are also affected:\n* Cisco 500 Series Content Engines\n* Cisco 7300 Series Content Engines\n* Cisco Content Routers 4400 series\n* Cisco Content Distribution Manager 4600 series\n* Cisco Content Engine Module for Cisco 2600, 2800, 3600, 3700, and\n3800 series Integrated Service Routers. \n\nSOLUTION:\nSee patch matrix in vendor advisory for information about fixes. \nhttp://www.cisco.com/warp/public/707/cisco-sn-20050524-dns.shtml#software\n\nPROVIDED AND/OR DISCOVERED BY:\nNISCC credits Dr. Steve Beaty. \n\nORIGINAL ADVISORY:\nCisco:\nhttp://www.cisco.com/warp/public/707/cisco-sn-20050524-dns.shtml\n\nNISCC:\nhttp://www.niscc.gov.uk/niscc/docs/al-20050524-00433.html\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n", "sources": [ { "db": "NVD", "id": "CVE-2005-4794" }, { "db": "CERT/CC", "id": "VU#23495" }, { "db": "BID", "id": "13729" }, { "db": "VULHUB", "id": "VHN-16002" }, { "db": "PACKETSTORM", "id": "37713" } ], "trust": 2.07 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "BID", "id": "13729", "trust": 2.8 }, { "db": "SECUNIA", "id": "15472", "trust": 2.6 }, { "db": "SECTRACK", "id": "1014043", "trust": 2.5 }, { "db": "SECTRACK", "id": "1014044", "trust": 2.5 }, { "db": "SECTRACK", "id": "1014045", "trust": 2.5 }, { "db": "SECTRACK", "id": "1014046", "trust": 2.5 }, { "db": "NVD", "id": "CVE-2005-4794", "trust": 2.0 }, { "db": "SECTRACK", "id": "1015975", "trust": 1.7 }, { "db": "OSVDB", "id": "19003", "trust": 1.7 }, { "db": "BID", "id": "1165", "trust": 0.8 }, { "db": "CERT/CC", "id": "VU#23495", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-200512-642", "trust": 0.7 }, { "db": "CISCO", "id": "20050524 CRAFTED DNS PACKET CAN CAUSE DENIAL OF SERVICE", "trust": 0.6 }, { "db": "XF", "id": "20712", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-16002", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "37713", "trust": 0.1 } ], "sources": [ { "db": "CERT/CC", "id": "VU#23495" }, { "db": "VULHUB", "id": "VHN-16002" }, { "db": "BID", "id": "13729" }, { "db": "PACKETSTORM", "id": "37713" }, { "db": "NVD", "id": "CVE-2005-4794" }, { "db": "CNNVD", "id": "CNNVD-200512-642" } ] }, "id": "VAR-200512-0860", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-16002" } ], "trust": 0.6217111649999999 }, "last_update_date": "2023-12-18T12:53:32.595000Z", "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2005-4794" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.9, "url": "http://www.niscc.gov.uk/niscc/docs/al-20050524-00433.html" }, { "trust": 2.9, "url": "http://www.cisco.com/warp/public/707/cisco-sn-20050524-dns.shtml" }, { "trust": 2.5, "url": "http://www.securityfocus.com/bid/13729" }, { "trust": 1.7, "url": "http://www.niscc.gov.uk/niscc/docs/re-20050524-00432.pdf?lang=en" }, { "trust": 1.7, "url": "http://www.osvdb.org/19003" }, { "trust": 1.7, "url": "http://securitytracker.com/id?1014043" }, { "trust": 1.7, "url": "http://securitytracker.com/id?1014044" }, { "trust": 1.7, "url": "http://securitytracker.com/id?1014045" }, { "trust": 1.7, "url": "http://securitytracker.com/id?1014046" }, { "trust": 1.7, "url": "http://securitytracker.com/id?1015975" }, { "trust": 1.7, "url": "http://secunia.com/advisories/15472" }, { "trust": 1.1, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/20712" }, { "trust": 0.9, "url": "http://secunia.com/advisories/15472/" }, { "trust": 0.8, "url": "http://www.securityfocus.com/bid/1165" }, { "trust": 0.8, "url": "http://www.ciac.org/ciac/bulletins/l-015.shtml" }, { "trust": 0.8, "url": "http://www.securitytracker.com/id?1014046" }, { "trust": 0.8, "url": "http://www.securitytracker.com/id?1014045" }, { "trust": 0.8, "url": "http://www.securitytracker.com/id?1014044" }, { "trust": 0.8, "url": "http://www.securitytracker.com/id?1014043" }, { "trust": 0.8, "url": "http://www.ethereal.com" }, { "trust": 0.8, "url": "http://www.tcpdump.org" }, { "trust": 0.6, "url": "http://xforce.iss.net/xforce/xfdb/20712" }, { "trust": 0.1, "url": "http://secunia.com/product/2810/" }, { "trust": 0.1, "url": "http://secunia.com/secunia_security_advisories/" }, { "trust": 0.1, "url": "http://secunia.com/about_secunia_advisories/" }, { "trust": 0.1, "url": "http://secunia.com/product/5151/" }, { "trust": 0.1, "url": "http://www.cisco.com/warp/public/707/cisco-sn-20050524-dns.shtml#software" }, { "trust": 0.1, "url": "http://secunia.com/secunia_vacancies/" }, { "trust": 0.1, "url": "http://secunia.com/product/2268/" }, { "trust": 0.1, "url": "http://secunia.com/product/2269/" }, { "trust": 0.1, "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org" }, { "trust": 0.1, "url": "http://secunia.com/product/2809/" } ], "sources": [ { "db": "CERT/CC", "id": "VU#23495" }, { "db": "VULHUB", "id": "VHN-16002" }, { "db": "BID", "id": "13729" }, { "db": "PACKETSTORM", "id": "37713" }, { "db": "NVD", "id": "CVE-2005-4794" }, { "db": "CNNVD", "id": "CNNVD-200512-642" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CERT/CC", "id": "VU#23495" }, { "db": "VULHUB", "id": "VHN-16002" }, { "db": "BID", "id": "13729" }, { "db": "PACKETSTORM", "id": "37713" }, { "db": "NVD", "id": "CVE-2005-4794" }, { "db": "CNNVD", "id": "CNNVD-200512-642" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2001-06-18T00:00:00", "db": "CERT/CC", "id": "VU#23495" }, { "date": "2005-12-31T00:00:00", "db": "VULHUB", "id": "VHN-16002" }, { "date": "2005-05-24T00:00:00", "db": "BID", "id": "13729" }, { "date": "2005-05-29T20:22:44", "db": "PACKETSTORM", "id": "37713" }, { "date": "2005-12-31T05:00:00", "db": "NVD", "id": "CVE-2005-4794" }, { "date": "2005-12-31T00:00:00", "db": "CNNVD", "id": "CNNVD-200512-642" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2005-11-15T00:00:00", "db": "CERT/CC", "id": "VU#23495" }, { "date": "2017-07-20T00:00:00", "db": "VULHUB", "id": "VHN-16002" }, { "date": "2016-07-06T14:40:00", "db": "BID", "id": "13729" }, { "date": "2017-07-20T01:29:24.457000", "db": "NVD", "id": "CVE-2005-4794" }, { "date": "2006-05-03T00:00:00", "db": "CNNVD", "id": "CNNVD-200512-642" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-200512-642" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "DNS implementations vulnerable to denial-of-service attacks via malformed DNS queries", "sources": [ { "db": "CERT/CC", "id": "VU#23495" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Design Error", "sources": [ { "db": "BID", "id": "13729" }, { "db": "CNNVD", "id": "CNNVD-200512-642" } ], "trust": 0.9 } }
var-200512-0639
Vulnerability from variot
The DNS implementation of PowerDNS 2.9.16 and earlier allows remote attackers to cause a denial of service via a compressed DNS packet with a label length byte with an incorrect offset, which could trigger an infinite loop. Incorrect decoding of malformed DNS packets causes certain DNS implementations to hang or crash. Multiple DNS vendors are susceptible to a remote denial-of-service vulnerability. This issue affects both DNS servers and clients. This issue arises when an affected application handles a specially crafted DNS message. A successful attack would crash the affected client or server.
Bist Du interessiert an einem neuen Job in IT-Sicherheit?
Secunia hat zwei freie Stellen als Junior und Senior Spezialist in IT- Sicherheit: http://secunia.com/secunia_vacancies/
TITLE: Cisco Various Products Compressed DNS Messages Denial of Service
SECUNIA ADVISORY ID: SA15472
VERIFY ADVISORY: http://secunia.com/advisories/15472/
CRITICAL: Less critical
IMPACT: DoS
WHERE:
From remote
OPERATING SYSTEM: Cisco ATA 180 Series Analog Telephone Adaptors http://secunia.com/product/2810/
SOFTWARE: Cisco IP Phone 7900 Series http://secunia.com/product/2809/ Cisco ACNS Software Version 5.x http://secunia.com/product/2268/ Cisco ACNS Software Version 4.x http://secunia.com/product/2269/ Cisco Unity Express 2.x http://secunia.com/product/5151/
DESCRIPTION: A vulnerability has been reported in various Cisco products, which can be exploited by malicious people to cause a DoS (Denial of Service).
The vulnerability is caused due to an error in the DNS implementation during the decompression of compressed DNS messages and can be exploited via a specially crafted DNS packet containing invalid information in the compressed section.
Successful exploitation crashes a vulnerable device or causes it to function abnormally.
The vulnerability affects the following products: * Cisco IP Phones 7902/7905/7912 * Cisco ATA (Analog Telephone Adaptor) 186/188 * Cisco Unity Express
The following Cisco ACNS (Application and Content Networking System) devices are also affected: * Cisco 500 Series Content Engines * Cisco 7300 Series Content Engines * Cisco Content Routers 4400 series * Cisco Content Distribution Manager 4600 series * Cisco Content Engine Module for Cisco 2600, 2800, 3600, 3700, and 3800 series Integrated Service Routers.
SOLUTION: See patch matrix in vendor advisory for information about fixes. http://www.cisco.com/warp/public/707/cisco-sn-20050524-dns.shtml#software
PROVIDED AND/OR DISCOVERED BY: NISCC credits Dr. Steve Beaty.
ORIGINAL ADVISORY: Cisco: http://www.cisco.com/warp/public/707/cisco-sn-20050524-dns.shtml
NISCC: http://www.niscc.gov.uk/niscc/docs/al-20050524-00433.html
About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
Show details on source website
{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200512-0639", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "powerdns", "scope": "eq", "trust": 1.9, "vendor": "powerdns", "version": "2.9.15" }, { "model": "powerdns", "scope": "eq", "trust": 1.6, "vendor": "powerdns", "version": "2.9.5" }, { "model": "powerdns", "scope": "eq", "trust": 1.6, "vendor": "powerdns", "version": "2.9.3a" }, { "model": "powerdns", "scope": "eq", "trust": 1.6, "vendor": "powerdns", "version": "2.9.7" }, { "model": "powerdns", "scope": "eq", "trust": 1.6, "vendor": "powerdns", "version": "2.9.2" }, { "model": "powerdns", "scope": "eq", "trust": 1.6, "vendor": "powerdns", "version": "2.9.8" }, { "model": "powerdns", "scope": "eq", "trust": 1.6, "vendor": "powerdns", "version": "2.9.4" }, { "model": "powerdns", "scope": "eq", "trust": 1.6, "vendor": "powerdns", "version": "2.9.14" }, { "model": "powerdns", "scope": "eq", "trust": 1.6, "vendor": "powerdns", "version": "2.9.6" }, { "model": "powerdns", "scope": "eq", "trust": 1.3, "vendor": "powerdns", "version": "2.8" }, { "model": "powerdns", "scope": "eq", "trust": 1.0, "vendor": "powerdns", "version": "2.9.0" }, { "model": "powerdns", "scope": "eq", "trust": 1.0, "vendor": "powerdns", "version": "2.0_rc1" }, { "model": "powerdns", "scope": "lte", "trust": 1.0, "vendor": "powerdns", "version": "2.9.16" }, { "model": "powerdns", "scope": "eq", "trust": 1.0, "vendor": "powerdns", "version": "2.9.13" }, { "model": "powerdns", "scope": "eq", "trust": 1.0, "vendor": "powerdns", "version": "2.9.1" }, { "model": "powerdns", "scope": "eq", "trust": 1.0, "vendor": "powerdns", "version": "2.9.10" }, { "model": "powerdns", "scope": "eq", "trust": 1.0, "vendor": "powerdns", "version": "2.9.12" }, { "model": "powerdns", "scope": "eq", "trust": 1.0, "vendor": "powerdns", "version": "2.9.11" }, { "model": "powerdns", "scope": "eq", "trust": 0.9, "vendor": "powerdns", "version": "2.9.16" }, { "model": null, "scope": null, "trust": 0.8, "vendor": "ethereal", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "tcpdump", "version": null }, { "model": "application \u0026 content networking software", "scope": null, "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "rc1", "scope": "eq", "trust": 0.3, "vendor": "powerdns", "version": "2.0" }, { "model": "dnrd", "scope": "eq", "trust": 0.3, "vendor": "dnrd", "version": "2.10" }, { "model": "dnrd", "scope": "eq", "trust": 0.3, "vendor": "dnrd", "version": "2.9" }, { "model": "dnrd", "scope": "eq", "trust": 0.3, "vendor": "dnrd", "version": "2.8" }, { "model": "dnrd", "scope": "eq", "trust": 0.3, "vendor": "dnrd", "version": "2.7" }, { "model": "dnrd", "scope": "eq", "trust": 0.3, "vendor": "dnrd", "version": "2.6" }, { "model": "dnrd", "scope": "eq", "trust": 0.3, "vendor": "dnrd", "version": "2.5" }, { "model": "dnrd", "scope": "eq", "trust": 0.3, "vendor": "dnrd", "version": "2.4" }, { "model": "dnrd", "scope": "eq", "trust": 0.3, "vendor": "dnrd", "version": "2.3" }, { "model": "dnrd", "scope": "eq", "trust": 0.3, "vendor": "dnrd", "version": "2.2" }, { "model": "dnrd", "scope": "eq", "trust": 0.3, "vendor": "dnrd", "version": "2.1" }, { "model": "dnrd", "scope": "eq", "trust": 0.3, "vendor": "dnrd", "version": "2.0" }, { "model": "dnrd", "scope": "eq", "trust": 0.3, "vendor": "dnrd", "version": "1.4" }, { "model": "dnrd", "scope": "eq", "trust": 0.3, "vendor": "dnrd", "version": "1.3" }, { "model": "dnrd", "scope": "eq", "trust": 0.3, "vendor": "dnrd", "version": "1.2" }, { "model": "dnrd", "scope": "eq", "trust": 0.3, "vendor": "dnrd", "version": "1.1" }, { "model": "dnrd", "scope": "eq", "trust": 0.3, "vendor": "dnrd", "version": "1.0" }, { "model": "delegate", "scope": "eq", "trust": 0.3, "vendor": "delegate", "version": "8.10.2" }, { "model": "delegate", "scope": "eq", "trust": 0.3, "vendor": "delegate", "version": "8.10.1" }, { "model": "delegate", "scope": "eq", "trust": 0.3, "vendor": "delegate", "version": "8.10" }, { "model": "delegate", "scope": "eq", "trust": 0.3, "vendor": "delegate", "version": "8.9.6" }, { "model": "delegate", "scope": "eq", "trust": 0.3, "vendor": "delegate", "version": "8.9.5" }, { "model": "delegate", "scope": "eq", "trust": 0.3, "vendor": "delegate", "version": "8.9.4" }, { "model": "delegate", "scope": "eq", "trust": 0.3, "vendor": "delegate", "version": "8.9.3" }, { "model": "delegate", "scope": "eq", "trust": 0.3, "vendor": "delegate", "version": "8.9.2" }, { "model": "delegate", "scope": "eq", "trust": 0.3, "vendor": "delegate", "version": "8.9.1" }, { "model": "delegate", "scope": "eq", "trust": 0.3, "vendor": "delegate", "version": "8.9" }, { "model": "delegate", "scope": "eq", "trust": 0.3, "vendor": "delegate", "version": "8.5.0" }, { "model": "delegate", "scope": "eq", "trust": 0.3, "vendor": "delegate", "version": "8.4.0" }, { "model": "delegate", "scope": "eq", "trust": 0.3, "vendor": "delegate", "version": "8.3.4" }, { "model": "delegate", "scope": "eq", "trust": 0.3, "vendor": "delegate", "version": "8.3.3" }, { "model": "delegate", "scope": "eq", "trust": 0.3, "vendor": "delegate", "version": "7.9.11" }, { "model": "delegate", "scope": "eq", "trust": 0.3, "vendor": "delegate", "version": "7.8.2" }, { "model": "delegate", "scope": "eq", "trust": 0.3, "vendor": "delegate", "version": "7.8.1" }, { "model": "delegate", "scope": "eq", "trust": 0.3, "vendor": "delegate", "version": "7.8.0" }, { "model": "delegate", "scope": "eq", "trust": 0.3, "vendor": "delegate", "version": "7.7.1" }, { "model": "delegate", "scope": "eq", "trust": 0.3, "vendor": "delegate", "version": "7.7.0" }, { "model": "unity express", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "subscriber edge services manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.3(1)" }, { "model": "subscriber edge services manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.2(2)" }, { "model": "subscriber edge services manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3.2(1)" }, { "model": "ip phone", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "79120" }, { "model": "ip phone", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7905" }, { "model": "ip phone", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7902" }, { "model": "content router", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4450" }, { "model": "content router", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "44304.1" }, { "model": "content router", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "44304.0" }, { "model": "content router", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4430" }, { "model": "content engine module for cisco router series", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3800" }, { "model": "content engine module for cisco router series", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3700" }, { "model": "content engine module for cisco router series", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "3600" }, { "model": "content engine module for cisco router series", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2800" }, { "model": "content engine module for cisco router series", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "2600" }, { "model": "content engine", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7325" }, { "model": "content engine", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "73204.1" }, { "model": "content engine", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "73204.0" }, { "model": "content engine", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "73203.1" }, { "model": "content engine", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "73202.2.0" }, { "model": "content engine", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7320" }, { "model": "content engine", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5904.1" }, { "model": "content engine", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5904.0" }, { "model": "content engine", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5903.1" }, { "model": "content engine", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5902.2.0" }, { "model": "content engine", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "590" }, { "model": "content engine", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "565" }, { "model": "content engine", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5604.1" }, { "model": "content engine", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5604.0" }, { "model": "content engine", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5603.1" }, { "model": "content engine", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5602.2.0" }, { "model": "content engine", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "560" }, { "model": "content engine", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "510" }, { "model": "content engine", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5074.1" }, { "model": "content engine", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5074.0" }, { "model": "content engine", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5073.1" }, { "model": "content engine", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5072.2.0" }, { "model": "content engine", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "507" }, { "model": "content distribution manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4670" }, { "model": "content distribution manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "46504.1" }, { "model": "content distribution manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "46504.0" }, { "model": "content distribution manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4650" }, { "model": "content distribution manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "46304.1" }, { "model": "content distribution manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "46304.0" }, { "model": "content distribution manager", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4630" }, { "model": "ata-188", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ata-186", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "application \u0026 content networking software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.2.3.9" }, { "model": "application \u0026 content networking software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.2.1.7" }, { "model": "application \u0026 content networking software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.2" }, { "model": "application \u0026 content networking software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.1.13.7" }, { "model": "application \u0026 content networking software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.1.11.6" }, { "model": "application \u0026 content networking software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.1" }, { "model": "application \u0026 content networking software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.0.17.6" }, { "model": "application \u0026 content networking software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.0.5" }, { "model": "application \u0026 content networking software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.0.3" }, { "model": "application \u0026 content networking software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.0.1" }, { "model": "application \u0026 content networking software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5.0" }, { "model": "application \u0026 content networking software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.2.11" }, { "model": "application \u0026 content networking software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.2.9" }, { "model": "application \u0026 content networking software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.2.7" }, { "model": "application \u0026 content networking software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.2" }, { "model": "application \u0026 content networking software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.1.3" }, { "model": "application \u0026 content networking software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.1.1" }, { "model": "application \u0026 content networking software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4.0.3" }, { "model": "powerdns", "scope": "ne", "trust": 0.3, "vendor": "powerdns", "version": "2.9.17" }, { "model": "dnrd", "scope": "ne", "trust": 0.3, "vendor": "dnrd", "version": "2.18" }, { "model": "delegate", "scope": "ne", "trust": 0.3, "vendor": "delegate", "version": "8.11.1" }, { "model": "delegate", "scope": "ne", "trust": 0.3, "vendor": "delegate", "version": "8.11" }, { "model": "delegate", "scope": "ne", "trust": 0.3, "vendor": "delegate", "version": "8.10.6" }, { "model": "delegate", "scope": "ne", "trust": 0.3, "vendor": "delegate", "version": "8.10.5" }, { "model": "delegate", "scope": "ne", "trust": 0.3, "vendor": "delegate", "version": "8.10.4" }, { "model": "delegate", "scope": "ne", "trust": 0.3, "vendor": "delegate", "version": "8.10.3" }, { "model": "subscriber edge services manager", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "3.3(2)" }, { "model": "application \u0026 content networking software", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "5.3.3" }, { "model": "application \u0026 content networking software", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "5.2.7" }, { "model": "application \u0026 content networking software", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "5.1.15" } ], "sources": [ { "db": "CERT/CC", "id": "VU#23495" }, { "db": "BID", "id": "13729" }, { "db": "NVD", "id": "CVE-2005-0038" }, { "db": "CNNVD", "id": "CNNVD-200512-776" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:powerdns:powerdns:2.9.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:powerdns:powerdns:2.9.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:powerdns:powerdns:2.9.13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:powerdns:powerdns:2.9.14:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:powerdns:powerdns:2.0_rc1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:powerdns:powerdns:2.9.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:powerdns:powerdns:2.9.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:powerdns:powerdns:2.9.15:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:powerdns:powerdns:2.9.3a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:powerdns:powerdns:2.9.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:powerdns:powerdns:2.9.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:powerdns:powerdns:2.9.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:powerdns:powerdns:2.9.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:powerdns:powerdns:2.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:powerdns:powerdns:2.9.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:powerdns:powerdns:2.9.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:powerdns:powerdns:2.9.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:powerdns:powerdns:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2.9.16", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2005-0038" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Discovered by Dr. Steve Beaty from the Department of Mathematical and Computer Sciences at the Metropolitan State College of Denver.", "sources": [ { "db": "BID", "id": "13729" }, { "db": "CNNVD", "id": "CNNVD-200512-776" } ], "trust": 0.9 }, "cve": "CVE-2005-0038", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2005-0038", "trust": 1.0, "value": "MEDIUM" }, { "author": "CARNEGIE MELLON", "id": "VU#23495", "trust": 0.8, "value": "41.92" }, { "author": "CNNVD", "id": "CNNVD-200512-776", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CERT/CC", "id": "VU#23495" }, { "db": "NVD", "id": "CVE-2005-0038" }, { "db": "CNNVD", "id": "CNNVD-200512-776" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The DNS implementation of PowerDNS 2.9.16 and earlier allows remote attackers to cause a denial of service via a compressed DNS packet with a label length byte with an incorrect offset, which could trigger an infinite loop. Incorrect decoding of malformed DNS packets causes certain DNS implementations to hang or crash. Multiple DNS vendors are susceptible to a remote denial-of-service vulnerability. This issue affects both DNS servers and clients. \nThis issue arises when an affected application handles a specially crafted DNS message. \nA successful attack would crash the affected client or server. \n\n----------------------------------------------------------------------\n\nBist Du interessiert an einem neuen Job in IT-Sicherheit?\n\n\nSecunia hat zwei freie Stellen als Junior und Senior Spezialist in IT-\nSicherheit:\nhttp://secunia.com/secunia_vacancies/\n\n----------------------------------------------------------------------\n\nTITLE:\nCisco Various Products Compressed DNS Messages Denial of Service\n\nSECUNIA ADVISORY ID:\nSA15472\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/15472/\n\nCRITICAL:\nLess critical\n\nIMPACT:\nDoS\n\nWHERE:\n\u003eFrom remote\n\nOPERATING SYSTEM:\nCisco ATA 180 Series Analog Telephone Adaptors\nhttp://secunia.com/product/2810/\n\nSOFTWARE:\nCisco IP Phone 7900 Series\nhttp://secunia.com/product/2809/\nCisco ACNS Software Version 5.x\nhttp://secunia.com/product/2268/\nCisco ACNS Software Version 4.x\nhttp://secunia.com/product/2269/\nCisco Unity Express 2.x\nhttp://secunia.com/product/5151/\n\nDESCRIPTION:\nA vulnerability has been reported in various Cisco products, which\ncan be exploited by malicious people to cause a DoS (Denial of\nService). \n\nThe vulnerability is caused due to an error in the DNS implementation\nduring the decompression of compressed DNS messages and can be\nexploited via a specially crafted DNS packet containing invalid\ninformation in the compressed section. \n\nSuccessful exploitation crashes a vulnerable device or causes it to\nfunction abnormally. \n\nThe vulnerability affects the following products:\n* Cisco IP Phones 7902/7905/7912\n* Cisco ATA (Analog Telephone Adaptor) 186/188\n* Cisco Unity Express\n\nThe following Cisco ACNS (Application and Content Networking System)\ndevices are also affected:\n* Cisco 500 Series Content Engines\n* Cisco 7300 Series Content Engines\n* Cisco Content Routers 4400 series\n* Cisco Content Distribution Manager 4600 series\n* Cisco Content Engine Module for Cisco 2600, 2800, 3600, 3700, and\n3800 series Integrated Service Routers. \n\nSOLUTION:\nSee patch matrix in vendor advisory for information about fixes. \nhttp://www.cisco.com/warp/public/707/cisco-sn-20050524-dns.shtml#software\n\nPROVIDED AND/OR DISCOVERED BY:\nNISCC credits Dr. Steve Beaty. \n\nORIGINAL ADVISORY:\nCisco:\nhttp://www.cisco.com/warp/public/707/cisco-sn-20050524-dns.shtml\n\nNISCC:\nhttp://www.niscc.gov.uk/niscc/docs/al-20050524-00433.html\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n", "sources": [ { "db": "NVD", "id": "CVE-2005-0038" }, { "db": "CERT/CC", "id": "VU#23495" }, { "db": "BID", "id": "13729" }, { "db": "PACKETSTORM", "id": "37713" } ], "trust": 1.98 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "BID", "id": "13729", "trust": 2.7 }, { "db": "NVD", "id": "CVE-2005-0038", "trust": 1.9 }, { "db": "OSVDB", "id": "25291", "trust": 1.6 }, { "db": "SECUNIA", "id": "15472", "trust": 0.9 }, { "db": "SECTRACK", "id": "1014043", "trust": 0.8 }, { "db": "SECTRACK", "id": "1014044", "trust": 0.8 }, { "db": "SECTRACK", "id": "1014045", "trust": 0.8 }, { "db": "SECTRACK", "id": "1014046", "trust": 0.8 }, { "db": "BID", "id": "1165", "trust": 0.8 }, { "db": "CERT/CC", "id": "VU#23495", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-200512-776", "trust": 0.6 }, { "db": "PACKETSTORM", "id": "37713", "trust": 0.1 } ], "sources": [ { "db": "CERT/CC", "id": "VU#23495" }, { "db": "BID", "id": "13729" }, { "db": "PACKETSTORM", "id": "37713" }, { "db": "NVD", "id": "CVE-2005-0038" }, { "db": "CNNVD", "id": "CNNVD-200512-776" } ] }, "id": "VAR-200512-0639", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.37675563 }, "last_update_date": "2023-12-18T12:53:32.528000Z", "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2005-0038" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.8, "url": "http://www.niscc.gov.uk/niscc/docs/al-20050524-00433.html" }, { "trust": 2.4, "url": "http://www.securityfocus.com/bid/13729" }, { "trust": 1.6, "url": "http://www.niscc.gov.uk/niscc/docs/re-20050524-00432.pdf?lang=en" }, { "trust": 1.6, "url": "http://www.osvdb.org/25291" }, { "trust": 1.2, "url": "http://www.cisco.com/warp/public/707/cisco-sn-20050524-dns.shtml" }, { "trust": 0.9, "url": "http://secunia.com/advisories/15472/" }, { "trust": 0.8, "url": "http://www.securityfocus.com/bid/1165" }, { "trust": 0.8, "url": "http://www.ciac.org/ciac/bulletins/l-015.shtml" }, { "trust": 0.8, "url": "http://www.securitytracker.com/id?1014046" }, { "trust": 0.8, "url": "http://www.securitytracker.com/id?1014045" }, { "trust": 0.8, "url": "http://www.securitytracker.com/id?1014044" }, { "trust": 0.8, "url": "http://www.securitytracker.com/id?1014043" }, { "trust": 0.8, "url": "http://www.ethereal.com" }, { "trust": 0.8, "url": "http://www.tcpdump.org" }, { "trust": 0.1, "url": "http://secunia.com/product/2810/" }, { "trust": 0.1, "url": "http://secunia.com/secunia_security_advisories/" }, { "trust": 0.1, "url": "http://secunia.com/about_secunia_advisories/" }, { "trust": 0.1, "url": "http://secunia.com/product/5151/" }, { "trust": 0.1, "url": "http://www.cisco.com/warp/public/707/cisco-sn-20050524-dns.shtml#software" }, { "trust": 0.1, "url": "http://secunia.com/secunia_vacancies/" }, { "trust": 0.1, "url": "http://secunia.com/product/2268/" }, { "trust": 0.1, "url": "http://secunia.com/product/2269/" }, { "trust": 0.1, "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org" }, { "trust": 0.1, "url": "http://secunia.com/product/2809/" } ], "sources": [ { "db": "CERT/CC", "id": "VU#23495" }, { "db": "BID", "id": "13729" }, { "db": "PACKETSTORM", "id": "37713" }, { "db": "NVD", "id": "CVE-2005-0038" }, { "db": "CNNVD", "id": "CNNVD-200512-776" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CERT/CC", "id": "VU#23495" }, { "db": "BID", "id": "13729" }, { "db": "PACKETSTORM", "id": "37713" }, { "db": "NVD", "id": "CVE-2005-0038" }, { "db": "CNNVD", "id": "CNNVD-200512-776" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2001-06-18T00:00:00", "db": "CERT/CC", "id": "VU#23495" }, { "date": "2005-05-24T00:00:00", "db": "BID", "id": "13729" }, { "date": "2005-05-29T20:22:44", "db": "PACKETSTORM", "id": "37713" }, { "date": "2005-12-31T05:00:00", "db": "NVD", "id": "CVE-2005-0038" }, { "date": "2005-12-31T00:00:00", "db": "CNNVD", "id": "CNNVD-200512-776" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2005-11-15T00:00:00", "db": "CERT/CC", "id": "VU#23495" }, { "date": "2016-07-06T14:40:00", "db": "BID", "id": "13729" }, { "date": "2008-09-05T20:45:08.247000", "db": "NVD", "id": "CVE-2005-0038" }, { "date": "2010-06-23T00:00:00", "db": "CNNVD", "id": "CNNVD-200512-776" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-200512-776" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "DNS implementations vulnerable to denial-of-service attacks via malformed DNS queries", "sources": [ { "db": "CERT/CC", "id": "VU#23495" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Design Error", "sources": [ { "db": "BID", "id": "13729" }, { "db": "CNNVD", "id": "CNNVD-200512-776" } ], "trust": 0.9 } }