Search criteria

43 vulnerabilities found for maradns by maradns

VAR-200412-0018

Vulnerability from variot - Updated: 2023-12-18 12:13

Multiple implementations of the DNS protocol, including (1) Poslib 1.0.2-1 and earlier as used by Posadis, (2) Axis Network products before firmware 3.13, and (3) Men & Mice Suite 2.2x before 2.2.3 and 3.5.x before 3.5.2, allow remote attackers to cause a denial of service (CPU and network bandwidth consumption) by triggering a communications loop via (a) DNS query packets with localhost as a spoofed source address, or (b) a response packet that triggers a response packet. [CERT/CC VU#887766 See also ] DNS A vulnerability in the protocol implementation has been identified. Depending on the implementation, between servers Query - response A storm may occur. Also, localhost UDP 53 Port is From If a query with is sent, the server may continue to respond to the server itself and resources may be exhausted.Denial of service (denial-of-service, DoS) You can be attacked. Multiple DNS vendors are reported susceptible to a denial of service vulnerability

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-200412-0018",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "delegate",
        "scope": "eq",
        "trust": 1.9,
        "vendor": "delegate",
        "version": "8.9.5"
      },
      {
        "model": "wingate",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "qbik",
        "version": "4.0.1"
      },
      {
        "model": "wingate",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "qbik",
        "version": "3.0"
      },
      {
        "model": "posadis",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "posadis",
        "version": "0.60.1"
      },
      {
        "model": "posadis",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "posadis",
        "version": "0.60.0"
      },
      {
        "model": "posadis",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "posadis",
        "version": "0.50.9"
      },
      {
        "model": "posadis",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "posadis",
        "version": "0.50.8"
      },
      {
        "model": "posadis",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "posadis",
        "version": "0.50.7"
      },
      {
        "model": "posadis",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "posadis",
        "version": "0.50.6"
      },
      {
        "model": "posadis",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "posadis",
        "version": "0.50.5"
      },
      {
        "model": "posadis",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "posadis",
        "version": "0.50.4"
      },
      {
        "model": "maradns",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "maradns",
        "version": "0.8.05"
      },
      {
        "model": "maradns",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "maradns",
        "version": "0.5.31"
      },
      {
        "model": "maradns",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "maradns",
        "version": "0.5.30"
      },
      {
        "model": "maradns",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "maradns",
        "version": "0.5.29"
      },
      {
        "model": "maradns",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "maradns",
        "version": "0.5.28"
      },
      {
        "model": "dnrd",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "dnrd",
        "version": "2.10"
      },
      {
        "model": "dnrd",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "dnrd",
        "version": "2.9"
      },
      {
        "model": "dnrd",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "dnrd",
        "version": "2.8"
      },
      {
        "model": "dnrd",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "dnrd",
        "version": "2.7"
      },
      {
        "model": "dnrd",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "dnrd",
        "version": "2.6"
      },
      {
        "model": "dnrd",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "dnrd",
        "version": "2.5"
      },
      {
        "model": "dnrd",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "dnrd",
        "version": "2.4"
      },
      {
        "model": "dnrd",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "dnrd",
        "version": "2.3"
      },
      {
        "model": "dnrd",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "dnrd",
        "version": "2.2"
      },
      {
        "model": "dnrd",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "dnrd",
        "version": "2.1"
      },
      {
        "model": "dnrd",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "dnrd",
        "version": "2.0"
      },
      {
        "model": "dnrd",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "dnrd",
        "version": "1.4"
      },
      {
        "model": "dnrd",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "dnrd",
        "version": "1.3"
      },
      {
        "model": "dnrd",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "dnrd",
        "version": "1.2"
      },
      {
        "model": "dnrd",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "dnrd",
        "version": "1.1"
      },
      {
        "model": "dnrd",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "dnrd",
        "version": "1.0"
      },
      {
        "model": "delegate",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "delegate",
        "version": "8.9.4"
      },
      {
        "model": "delegate",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "delegate",
        "version": "8.9.3"
      },
      {
        "model": "delegate",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "delegate",
        "version": "8.9.2"
      },
      {
        "model": "delegate",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "delegate",
        "version": "8.9.1"
      },
      {
        "model": "delegate",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "delegate",
        "version": "8.9"
      },
      {
        "model": "delegate",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "delegate",
        "version": "8.5.0"
      },
      {
        "model": "delegate",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "delegate",
        "version": "8.4.0"
      },
      {
        "model": "delegate",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "delegate",
        "version": "8.3.4"
      },
      {
        "model": "delegate",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "delegate",
        "version": "8.3.3"
      },
      {
        "model": "delegate",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "delegate",
        "version": "7.9.11"
      },
      {
        "model": "delegate",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "delegate",
        "version": "7.8.2"
      },
      {
        "model": "delegate",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "delegate",
        "version": "7.8.1"
      },
      {
        "model": "delegate",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "delegate",
        "version": "7.8.0"
      },
      {
        "model": "delegate",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "delegate",
        "version": "7.7.1"
      },
      {
        "model": "delegate",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "delegate",
        "version": "7.7.0"
      },
      {
        "model": "2420 network camera",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "axis",
        "version": "2.31"
      },
      {
        "model": "raidendnsd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "team johnlong",
        "version": "*"
      },
      {
        "model": "2420 network camera",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "axis",
        "version": "2.40"
      },
      {
        "model": "2110 network camera",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "axis",
        "version": "2.40"
      },
      {
        "model": "2460 network dvr",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "axis",
        "version": "3.12"
      },
      {
        "model": "2100 network camera",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "axis",
        "version": "2.12"
      },
      {
        "model": "2420 network camera",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "axis",
        "version": "2.12"
      },
      {
        "model": "2110 network camera",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "axis",
        "version": "2.12"
      },
      {
        "model": "2420 network camera",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "axis",
        "version": "2.34"
      },
      {
        "model": "wingate",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qbik",
        "version": "6.0"
      },
      {
        "model": "2100 network camera",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "axis",
        "version": "2.0"
      },
      {
        "model": "2100 network camera",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "axis",
        "version": "2.32"
      },
      {
        "model": "posadis",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "posadis",
        "version": "m5pre2"
      },
      {
        "model": "2100 network camera",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "axis",
        "version": "2.30"
      },
      {
        "model": "2110 network camera",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "axis",
        "version": "2.32"
      },
      {
        "model": "2420 network camera",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "axis",
        "version": "2.30"
      },
      {
        "model": "2110 network camera",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "axis",
        "version": "2.30"
      },
      {
        "model": "mydns",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "don moore",
        "version": "0.10.0"
      },
      {
        "model": "2400 video server",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "axis",
        "version": "3.11"
      },
      {
        "model": "2100 network camera",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "axis",
        "version": "2.01"
      },
      {
        "model": "2120 network camera",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "axis",
        "version": "2.30"
      },
      {
        "model": "mydns",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "don moore",
        "version": "0.7"
      },
      {
        "model": "2100 network camera",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "axis",
        "version": "2.31"
      },
      {
        "model": "2100 network camera",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "axis",
        "version": "2.03"
      },
      {
        "model": "2100 network camera",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "axis",
        "version": "2.40"
      },
      {
        "model": "2120 network camera",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "axis",
        "version": "2.32"
      },
      {
        "model": "2110 network camera",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "axis",
        "version": "2.31"
      },
      {
        "model": "2120 network camera",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "axis",
        "version": "2.41"
      },
      {
        "model": "dns server",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "pliant",
        "version": "*"
      },
      {
        "model": "wingate",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qbik",
        "version": "4.1_beta_a"
      },
      {
        "model": "2100 network camera",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "axis",
        "version": "2.34"
      },
      {
        "model": "2100 network camera",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "axis",
        "version": "2.02"
      },
      {
        "model": "2110 network camera",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "axis",
        "version": "2.34"
      },
      {
        "model": "mydns",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "don moore",
        "version": "0.9"
      },
      {
        "model": "2120 network camera",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "axis",
        "version": "2.31"
      },
      {
        "model": "2120 network camera",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "axis",
        "version": "2.40"
      },
      {
        "model": "2400 video server",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "axis",
        "version": "3.12"
      },
      {
        "model": "mydns",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "don moore",
        "version": "0.6"
      },
      {
        "model": "mydns",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "don moore",
        "version": "0.8"
      },
      {
        "model": "2120 network camera",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "axis",
        "version": "2.12"
      },
      {
        "model": "2120 network camera",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "axis",
        "version": "2.34"
      },
      {
        "model": "2401 video server",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "axis",
        "version": "3.12"
      },
      {
        "model": "posadis",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "posadis",
        "version": "m5pre1"
      },
      {
        "model": "2420 network camera",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "axis",
        "version": "2.32"
      },
      {
        "model": "2100 network camera",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "axis",
        "version": "2.41"
      },
      {
        "model": "wingate",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qbik",
        "version": "6.0.1_build_995"
      },
      {
        "model": "wingate",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "qbik",
        "version": "6.0.1_build_993"
      },
      {
        "model": "2420 network camera",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "axis",
        "version": "2.41"
      },
      {
        "model": "2100 network camera",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "axis",
        "version": "2.33"
      },
      {
        "model": "2110 network camera",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "axis",
        "version": "2.41"
      },
      {
        "model": "2420 network camera",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "axis",
        "version": "2.33"
      },
      {
        "model": "",
        "scope": null,
        "trust": 0.8,
        "vendor": "multiple vendors",
        "version": null
      },
      {
        "model": "johnlong raidendnsd",
        "scope": null,
        "trust": 0.3,
        "vendor": "team",
        "version": null
      },
      {
        "model": "wingate build",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "qbik",
        "version": "6.0.1995"
      },
      {
        "model": "wingate build",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "qbik",
        "version": "6.0.1993"
      },
      {
        "model": "wingate",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "qbik",
        "version": "6.0.0"
      },
      {
        "model": "wingate beta a",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "qbik",
        "version": "4.1"
      },
      {
        "model": "m5pre2",
        "scope": null,
        "trust": 0.3,
        "vendor": "posadis",
        "version": null
      },
      {
        "model": "m5pre1",
        "scope": null,
        "trust": 0.3,
        "vendor": "posadis",
        "version": null
      },
      {
        "model": "dns server",
        "scope": null,
        "trust": 0.3,
        "vendor": "pliant",
        "version": null
      },
      {
        "model": "moore mydns",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "don",
        "version": "0.10.0"
      },
      {
        "model": "moore mydns",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "don",
        "version": "0.9x"
      },
      {
        "model": "moore mydns",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "don",
        "version": "0.8x"
      },
      {
        "model": "moore mydns",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "don",
        "version": "0.7x"
      },
      {
        "model": "moore mydns",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "don",
        "version": "0.6x"
      },
      {
        "model": "communications digital video recorder",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "axis",
        "version": "24603.12"
      },
      {
        "model": "communications network camera",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "axis",
        "version": "24202.41"
      },
      {
        "model": "communications network camera",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "axis",
        "version": "24202.40"
      },
      {
        "model": "communications network camera",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "axis",
        "version": "24202.34"
      },
      {
        "model": "communications network camera",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "axis",
        "version": "24202.33"
      },
      {
        "model": "communications network camera",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "axis",
        "version": "24202.32"
      },
      {
        "model": "communications network camera",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "axis",
        "version": "24202.31"
      },
      {
        "model": "communications network camera",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "axis",
        "version": "24202.30"
      },
      {
        "model": "communications network camera",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "axis",
        "version": "24202.12"
      },
      {
        "model": "communications video server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "axis",
        "version": "2401+3.12"
      },
      {
        "model": "communications video server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "axis",
        "version": "2400+3.12"
      },
      {
        "model": "communications video server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "axis",
        "version": "2400+3.11"
      },
      {
        "model": "communications network camera",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "axis",
        "version": "21202.41"
      },
      {
        "model": "communications network camera",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "axis",
        "version": "21202.40"
      },
      {
        "model": "communications network camera",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "axis",
        "version": "21202.34"
      },
      {
        "model": "communications network camera",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "axis",
        "version": "21202.32"
      },
      {
        "model": "communications network camera",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "axis",
        "version": "21202.31"
      },
      {
        "model": "communications network camera",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "axis",
        "version": "21202.30"
      },
      {
        "model": "communications network camera",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "axis",
        "version": "21202.12"
      },
      {
        "model": "communications network camera",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "axis",
        "version": "21102.41"
      },
      {
        "model": "communications network camera",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "axis",
        "version": "21102.40"
      },
      {
        "model": "communications network camera",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "axis",
        "version": "21102.34"
      },
      {
        "model": "communications network camera",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "axis",
        "version": "21102.32"
      },
      {
        "model": "communications network camera",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "axis",
        "version": "21102.31"
      },
      {
        "model": "communications network camera",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "axis",
        "version": "21102.30"
      },
      {
        "model": "communications network camera",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "axis",
        "version": "21102.12"
      },
      {
        "model": "communications network camera",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "axis",
        "version": "21002.41"
      },
      {
        "model": "communications network camera",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "axis",
        "version": "21002.40"
      },
      {
        "model": "communications network camera",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "axis",
        "version": "21002.34"
      },
      {
        "model": "communications network camera",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "axis",
        "version": "21002.33"
      },
      {
        "model": "communications network camera",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "axis",
        "version": "21002.32"
      },
      {
        "model": "communications network camera",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "axis",
        "version": "21002.31"
      },
      {
        "model": "communications network camera",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "axis",
        "version": "21002.30"
      },
      {
        "model": "communications network camera",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "axis",
        "version": "21002.12"
      },
      {
        "model": "communications network camera",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "axis",
        "version": "21002.03"
      },
      {
        "model": "communications network camera",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "axis",
        "version": "21002.02"
      },
      {
        "model": "communications network camera",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "axis",
        "version": "21002.01"
      },
      {
        "model": "communications network camera",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "axis",
        "version": "21002.0"
      },
      {
        "model": "wingate build",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "qbik",
        "version": "6.0.31005"
      },
      {
        "model": "wingate build",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "qbik",
        "version": "6.0.21001"
      },
      {
        "model": "wingate build",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "qbik",
        "version": "6.0.21000"
      },
      {
        "model": "posadis",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "posadis",
        "version": "0.60.5"
      },
      {
        "model": "posadis",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "posadis",
        "version": "0.60.4"
      },
      {
        "model": "posadis",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "posadis",
        "version": "0.60.3"
      },
      {
        "model": "posadis",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "posadis",
        "version": "0.60.2"
      },
      {
        "model": "quickdns server",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "men mice",
        "version": "3.5.2"
      },
      {
        "model": "quickdns server",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "men mice",
        "version": "2.2.3"
      },
      {
        "model": "maradns",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "maradns",
        "version": "1.0.23"
      },
      {
        "model": "maradns",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "maradns",
        "version": "0.9.01"
      },
      {
        "model": "maradns",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "maradns",
        "version": "0.9.00"
      },
      {
        "model": "maradns",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "maradns",
        "version": "0.8.99"
      },
      {
        "model": "bind",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "isc",
        "version": "9.2.3"
      },
      {
        "model": "bind",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "isc",
        "version": "9.2.2"
      },
      {
        "model": "bind",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "isc",
        "version": "9.2.1"
      },
      {
        "model": "bind",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "isc",
        "version": "9.2"
      },
      {
        "model": "bind",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "isc",
        "version": "9.1.3"
      },
      {
        "model": "bind",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "isc",
        "version": "9.1.2"
      },
      {
        "model": "bind",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "isc",
        "version": "9.1.1"
      },
      {
        "model": "bind",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "isc",
        "version": "9.1"
      },
      {
        "model": "bind",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "isc",
        "version": "9.0.1"
      },
      {
        "model": "bind",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "isc",
        "version": "9.0"
      },
      {
        "model": "bind",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "isc",
        "version": "8.4.3"
      },
      {
        "model": "bind",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "isc",
        "version": "8.4.2"
      },
      {
        "model": "bind",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "isc",
        "version": "8.4.1"
      },
      {
        "model": "bind",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "isc",
        "version": "8.4"
      },
      {
        "model": "bind",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "isc",
        "version": "8.3.7"
      },
      {
        "model": "bind",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "isc",
        "version": "8.3.6"
      },
      {
        "model": "bind",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "isc",
        "version": "8.3.5"
      },
      {
        "model": "bind",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "isc",
        "version": "8.3.4"
      },
      {
        "model": "bind",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "isc",
        "version": "8.3.3"
      },
      {
        "model": "bind",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "isc",
        "version": "8.3.2"
      },
      {
        "model": "bind",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "isc",
        "version": "8.3.1"
      },
      {
        "model": "bind",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "isc",
        "version": "8.3.0"
      },
      {
        "model": "bind",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "isc",
        "version": "8.2.7"
      },
      {
        "model": "bind",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "isc",
        "version": "8.2.6"
      },
      {
        "model": "bind",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "isc",
        "version": "8.2.5"
      },
      {
        "model": "bind",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "isc",
        "version": "8.2.4"
      },
      {
        "model": "bind beta",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "isc",
        "version": "8.2.3"
      },
      {
        "model": "bind",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "isc",
        "version": "8.2.3"
      },
      {
        "model": "bind p7",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "isc",
        "version": "8.2.2"
      },
      {
        "model": "bind p6",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "isc",
        "version": "8.2.2"
      },
      {
        "model": "bind p5",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "isc",
        "version": "8.2.2"
      },
      {
        "model": "bind p4",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "isc",
        "version": "8.2.2"
      },
      {
        "model": "bind p3",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "isc",
        "version": "8.2.2"
      },
      {
        "model": "bind p2",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "isc",
        "version": "8.2.2"
      },
      {
        "model": "bind p1",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "isc",
        "version": "8.2.2"
      },
      {
        "model": "bind",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "isc",
        "version": "8.2.2"
      },
      {
        "model": "bind",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "isc",
        "version": "8.2.1"
      },
      {
        "model": "bind",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "isc",
        "version": "8.2"
      },
      {
        "model": "bind",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "isc",
        "version": "8.1.2"
      },
      {
        "model": "bind",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "isc",
        "version": "8.1.1"
      },
      {
        "model": "bind",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "isc",
        "version": "8.1"
      },
      {
        "model": "bind",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "isc",
        "version": "4.9.11"
      },
      {
        "model": "bind ow2",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "isc",
        "version": "4.9.10"
      },
      {
        "model": "bind",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "isc",
        "version": "4.9.10"
      },
      {
        "model": "bind",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "isc",
        "version": "4.9.9"
      },
      {
        "model": "bind",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "isc",
        "version": "4.9.8"
      },
      {
        "model": "bind -t1b",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "isc",
        "version": "4.9.7"
      },
      {
        "model": "bind",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "isc",
        "version": "4.9.7"
      },
      {
        "model": "bind",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "isc",
        "version": "4.9.6"
      },
      {
        "model": "bind p1",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "isc",
        "version": "4.9.5"
      },
      {
        "model": "bind",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "isc",
        "version": "4.9.5"
      },
      {
        "model": "bind p1",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "isc",
        "version": "4.9.4"
      },
      {
        "model": "bind",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "isc",
        "version": "4.9.4"
      },
      {
        "model": "bind",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "isc",
        "version": "4.9.3"
      },
      {
        "model": "bind",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "isc",
        "version": "4.9.2"
      },
      {
        "model": "bind",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "isc",
        "version": "4.9"
      },
      {
        "model": "bind",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "isc",
        "version": "4.8.3"
      },
      {
        "model": "bind",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "isc",
        "version": "4.8.2.1"
      },
      {
        "model": "bind",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "isc",
        "version": "4.8.1"
      },
      {
        "model": "bind",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "isc",
        "version": "4.8"
      },
      {
        "model": "moore mydns",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "don",
        "version": "0.11.0"
      },
      {
        "model": "moore mydns",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "don",
        "version": "0.10.4"
      },
      {
        "model": "moore mydns",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "don",
        "version": "0.10.3"
      },
      {
        "model": "moore mydns",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "don",
        "version": "0.10.2"
      },
      {
        "model": "moore mydns",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "don",
        "version": "0.10.1"
      },
      {
        "model": "dnrd",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "dnrd",
        "version": "2.17.1"
      },
      {
        "model": "dnrd",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "dnrd",
        "version": "2.17"
      },
      {
        "model": "dnrd",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "dnrd",
        "version": "2.16"
      },
      {
        "model": "dnrd",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "dnrd",
        "version": "2.15"
      },
      {
        "model": "dnrd",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "dnrd",
        "version": "2.14"
      },
      {
        "model": "dnrd",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "dnrd",
        "version": "2.13"
      },
      {
        "model": "dnrd",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "dnrd",
        "version": "2.12"
      },
      {
        "model": "dnrd",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "dnrd",
        "version": "2.11"
      },
      {
        "model": "delegate",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "delegate",
        "version": "8.9.6"
      },
      {
        "model": "communications digital video recorder",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "axis",
        "version": "24603.13"
      },
      {
        "model": "communications network camera",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "axis",
        "version": "24202.42"
      },
      {
        "model": "communications video server",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "axis",
        "version": "2401+3.13"
      },
      {
        "model": "communications video server",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "axis",
        "version": "2400+3.13"
      },
      {
        "model": "communications network camera",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "axis",
        "version": "21202.42"
      },
      {
        "model": "communications network camera",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "axis",
        "version": "21102.42"
      },
      {
        "model": "communications network camera",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "axis",
        "version": "21002.42"
      }
    ],
    "sources": [
      {
        "db": "BID",
        "id": "11642"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2004-000608"
      },
      {
        "db": "NVD",
        "id": "CVE-2004-0789"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200412-718"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:delegate:delegate:7.8.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:delegate:delegate:7.8.2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:delegate:delegate:8.9.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:delegate:delegate:8.9.2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:dnrd:dnrd:1.3:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:dnrd:dnrd:1.4:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:dnrd:dnrd:2.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:dnrd:dnrd:2.6:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:dnrd:dnrd:2.7:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:don_moore:mydns:0.9:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:maradns:maradns:0.5.28:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:posadis:posadis:0.50.6:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:posadis:posadis:0.50.7:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:qbik:wingate:3.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:qbik:wingate:4.0.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:delegate:delegate:7.7.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:delegate:delegate:7.8.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:delegate:delegate:8.5.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:delegate:delegate:8.9:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:dnrd:dnrd:1.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:dnrd:dnrd:1.2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:dnrd:dnrd:2.4:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:dnrd:dnrd:2.5:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:don_moore:mydns:0.7:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:don_moore:mydns:0.8:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:pliant:pliant_dns_server:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:posadis:posadis:0.50.4:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:posadis:posadis:0.50.5:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:posadis:posadis:m5pre1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:posadis:posadis:m5pre2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:team_johnlong:raidendnsd:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:delegate:delegate:7.9.11:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:delegate:delegate:8.3.3:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:delegate:delegate:8.9.3:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:delegate:delegate:8.9.4:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:dnrd:dnrd:2.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:dnrd:dnrd:2.10:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:dnrd:dnrd:2.8:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:dnrd:dnrd:2.9:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:maradns:maradns:0.5.29:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:maradns:maradns:0.5.30:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:posadis:posadis:0.50.8:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:posadis:posadis:0.50.9:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:qbik:wingate:4.1_beta_a:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:qbik:wingate:6.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:delegate:delegate:7.7.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:delegate:delegate:8.3.4:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:delegate:delegate:8.4.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:delegate:delegate:8.9.5:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:dnrd:dnrd:1.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:dnrd:dnrd:2.2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:dnrd:dnrd:2.3:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:don_moore:mydns:0.10.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:don_moore:mydns:0.6:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:maradns:maradns:0.5.31:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:maradns:maradns:0.8.05:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:posadis:posadis:0.60.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:posadis:posadis:0.60.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:qbik:wingate:6.0.1_build_993:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:qbik:wingate:6.0.1_build_995:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          },
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:h:axis:2100_network_camera:2.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:axis:2100_network_camera:2.01:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:axis:2100_network_camera:2.34:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:axis:2100_network_camera:2.40:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:axis:2110_network_camera:2.40:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:axis:2110_network_camera:2.41:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:axis:2100_network_camera:2.31:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:axis:2100_network_camera:2.32:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:axis:2100_network_camera:2.33:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:axis:2110_network_camera:2.32:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:axis:2110_network_camera:2.34:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:axis:2120_network_camera:2.34:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:axis:2120_network_camera:2.40:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:axis:2420_network_camera:2.32:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:axis:2420_network_camera:2.33:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:axis:2100_network_camera:2.02:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:axis:2100_network_camera:2.03:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:axis:2100_network_camera:2.41:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:axis:2110_network_camera:2.12:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:axis:2120_network_camera:2.12:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:axis:2120_network_camera:2.30:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:axis:2400_video_server:3.12:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:axis:2401_video_server:3.12:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:axis:2420_network_camera:2.41:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:axis:2460_network_dvr:3.12:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:axis:2120_network_camera:2.41:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:axis:2400_video_server:3.11:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:axis:2420_network_camera:2.34:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:axis:2420_network_camera:2.40:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:axis:2100_network_camera:2.12:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:axis:2100_network_camera:2.30:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:axis:2110_network_camera:2.30:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:axis:2110_network_camera:2.31:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:axis:2120_network_camera:2.31:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:axis:2120_network_camera:2.32:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:axis:2420_network_camera:2.12:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:axis:2420_network_camera:2.30:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:axis:2420_network_camera:2.31:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2004-0789"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Roy Arends and Jakob Schlyter are credited on the NISCC advisory. The original discoverer of this vulnerability is unknown at this time.",
    "sources": [
      {
        "db": "BID",
        "id": "11642"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200412-718"
      }
    ],
    "trust": 0.9
  },
  "cve": "CVE-2004-0789",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "NVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.0,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "MEDIUM",
            "trust": 1.0,
            "userInteractionRequired": false,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Low",
            "accessVector": "Network",
            "authentication": "None",
            "author": "NVD",
            "availabilityImpact": "Partial",
            "baseScore": 5.0,
            "confidentialityImpact": "None",
            "exploitabilityScore": null,
            "id": "CVE-2004-0789",
            "impactScore": null,
            "integrityImpact": "None",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Medium",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.0,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "VHN-9219",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2004-0789",
            "trust": 1.8,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-200412-718",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "VULHUB",
            "id": "VHN-9219",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-9219"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2004-000608"
      },
      {
        "db": "NVD",
        "id": "CVE-2004-0789"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200412-718"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Multiple implementations of the DNS protocol, including (1) Poslib 1.0.2-1 and earlier as used by Posadis, (2) Axis Network products before firmware 3.13, and (3) Men \u0026 Mice Suite 2.2x before 2.2.3 and 3.5.x before 3.5.2, allow remote attackers to cause a denial of service (CPU and network bandwidth consumption) by triggering a communications loop via (a) DNS query packets with localhost as a spoofed source address, or (b) a response packet that triggers a response packet. [CERT/CC VU#887766 See also ] DNS A vulnerability in the protocol implementation has been identified. Depending on the implementation, between servers Query - response A storm may occur. Also, localhost UDP 53 Port is From If a query with is sent, the server may continue to respond to the server itself and resources may be exhausted.Denial of service (denial-of-service, DoS) You can be attacked. Multiple DNS vendors are reported susceptible to a denial of service vulnerability",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2004-0789"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2004-000608"
      },
      {
        "db": "BID",
        "id": "11642"
      },
      {
        "db": "VULHUB",
        "id": "VHN-9219"
      }
    ],
    "trust": 1.98
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2004-0789",
        "trust": 2.8
      },
      {
        "db": "BID",
        "id": "11642",
        "trust": 1.4
      },
      {
        "db": "SECUNIA",
        "id": "13145",
        "trust": 1.1
      },
      {
        "db": "SECTRACK",
        "id": "1012157",
        "trust": 1.1
      },
      {
        "db": "XF",
        "id": "17996",
        "trust": 0.8
      },
      {
        "db": "XF",
        "id": "17997",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2004-000608",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200412-718",
        "trust": 0.7
      },
      {
        "db": "VULHUB",
        "id": "VHN-9219",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-9219"
      },
      {
        "db": "BID",
        "id": "11642"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2004-000608"
      },
      {
        "db": "NVD",
        "id": "CVE-2004-0789"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200412-718"
      }
    ]
  },
  "id": "VAR-200412-0018",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-9219"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2023-12-18T12:13:45.102000Z",
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "NVD-CWE-Other",
        "trust": 1.0
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2004-0789"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 1.1,
        "url": "http://www.securityfocus.com/bid/11642"
      },
      {
        "trust": 1.1,
        "url": "http://www.posadis.org/advisories/pos_adv_006.txt"
      },
      {
        "trust": 1.1,
        "url": "http://www.niscc.gov.uk/niscc/docs/al-20041130-00862.html?lang=en"
      },
      {
        "trust": 1.1,
        "url": "http://www.niscc.gov.uk/niscc/docs/re-20041109-00957.pdf"
      },
      {
        "trust": 1.1,
        "url": "http://securitytracker.com/id?1012157"
      },
      {
        "trust": 1.1,
        "url": "http://secunia.com/advisories/13145"
      },
      {
        "trust": 1.1,
        "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17997"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=2004-0789"
      },
      {
        "trust": 0.8,
        "url": "http://xforce.iss.net/xforce/xfdb/17997"
      },
      {
        "trust": 0.8,
        "url": "http://xforce.iss.net/xforce/xfdb/17996"
      },
      {
        "trust": 0.8,
        "url": "http://jvn.jp/niscc/niscc-758884/"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2004-0789"
      },
      {
        "trust": 0.3,
        "url": "http://www.se.axis.com/techsup/cdsrv/storpoint_cd/index.html"
      },
      {
        "trust": 0.3,
        "url": "http://www.delegate.org/delegate/"
      },
      {
        "trust": 0.3,
        "url": "http://www.delegate.org/mail-lists/delegate-en/2753"
      },
      {
        "trust": 0.3,
        "url": "http://www.maradns.org/"
      },
      {
        "trust": 0.3,
        "url": "http://mydns.bboy.net/"
      },
      {
        "trust": 0.3,
        "url": "http://mydns.bboy.net/download/changelog.html"
      },
      {
        "trust": 0.3,
        "url": "http://www.axis.com/products/camera_servers/index.htm"
      },
      {
        "trust": 0.3,
        "url": "http://www.uniras.gov.uk/vuls/2004/758884/index.htm"
      },
      {
        "trust": 0.3,
        "url": "http://pliant.cx/pliant/protocol/dns/"
      },
      {
        "trust": 0.3,
        "url": "http://posadis.sourceforge.net/"
      },
      {
        "trust": 0.3,
        "url": "http://www.posadis.org/security/pos_adv_006.txt"
      },
      {
        "trust": 0.3,
        "url": "http://wingate.deerfield.com"
      },
      {
        "trust": 0.3,
        "url": "/archive/1/381612"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-9219"
      },
      {
        "db": "BID",
        "id": "11642"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2004-000608"
      },
      {
        "db": "NVD",
        "id": "CVE-2004-0789"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "VULHUB",
        "id": "VHN-9219"
      },
      {
        "db": "BID",
        "id": "11642"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2004-000608"
      },
      {
        "db": "NVD",
        "id": "CVE-2004-0789"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200412-718"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2004-12-31T00:00:00",
        "db": "VULHUB",
        "id": "VHN-9219"
      },
      {
        "date": "2004-11-09T00:00:00",
        "db": "BID",
        "id": "11642"
      },
      {
        "date": "2009-04-03T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2004-000608"
      },
      {
        "date": "2004-12-31T05:00:00",
        "db": "NVD",
        "id": "CVE-2004-0789"
      },
      {
        "date": "2004-12-31T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200412-718"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2017-07-11T00:00:00",
        "db": "VULHUB",
        "id": "VHN-9219"
      },
      {
        "date": "2009-07-12T08:06:00",
        "db": "BID",
        "id": "11642"
      },
      {
        "date": "2009-04-03T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2004-000608"
      },
      {
        "date": "2017-07-11T01:30:28.667000",
        "db": "NVD",
        "id": "CVE-2004-0789"
      },
      {
        "date": "2006-04-07T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200412-718"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200412-718"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "DNS Vulnerability in protocol implementation",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2004-000608"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Design Error",
    "sources": [
      {
        "db": "BID",
        "id": "11642"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200412-718"
      }
    ],
    "trust": 0.9
  }
}

FKIE_CVE-2023-31137

Vulnerability from fkie_nvd - Published: 2023-05-09 14:15 - Updated: 2024-11-21 08:01
Summary
MaraDNS is open-source software that implements the Domain Name System (DNS). In version 3.5.0024 and prior, a remotely exploitable integer underflow vulnerability in the DNS packet decompression function allows an attacker to cause a Denial of Service by triggering an abnormal program termination. The vulnerability exists in the `decomp_get_rddata` function within the `Decompress.c` file. When handling a DNS packet with an Answer RR of qtype 16 (TXT record) and any qclass, if the `rdlength` is smaller than `rdata`, the result of the line `Decompress.c:886` is a negative number `len = rdlength - total;`. This value is then passed to the `decomp_append_bytes` function without proper validation, causing the program to attempt to allocate a massive chunk of memory that is impossible to allocate. Consequently, the program exits with an error code of 64, causing a Denial of Service. One proposed fix for this vulnerability is to patch `Decompress.c:887` by breaking `if(len <= 0)`, which has been incorporated in version 3.5.0036 via commit bab062bde40b2ae8a91eecd522e84d8b993bab58.
References
security-advisories@github.comhttps://github.com/samboy/MaraDNS/blob/08b21ea20d80cedcb74aa8f14979ec7c61846663/dns/Decompress.c#L886Product
security-advisories@github.comhttps://github.com/samboy/MaraDNS/commit/bab062bde40b2ae8a91eecd522e84d8b993bab58Patch
security-advisories@github.comhttps://github.com/samboy/MaraDNS/security/advisories/GHSA-58m7-826v-9c3cVendor Advisory
security-advisories@github.comhttps://lists.debian.org/debian-lts-announce/2023/06/msg00019.htmlMailing List, Third Party Advisory
security-advisories@github.comhttps://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3VSMLJX25MXGQ6A7UPOGK7VPUVDESPHL/Mailing List, Third Party Advisory
security-advisories@github.comhttps://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NB7LDZM5AGWC5BHHQHW6CP5OFNBBKFOQ/Mailing List, Third Party Advisory
security-advisories@github.comhttps://www.debian.org/security/2023/dsa-5441Mailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://github.com/samboy/MaraDNS/blob/08b21ea20d80cedcb74aa8f14979ec7c61846663/dns/Decompress.c#L886Product
af854a3a-2127-422b-91ae-364da2661108https://github.com/samboy/MaraDNS/commit/bab062bde40b2ae8a91eecd522e84d8b993bab58Patch
af854a3a-2127-422b-91ae-364da2661108https://github.com/samboy/MaraDNS/security/advisories/GHSA-58m7-826v-9c3cVendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.debian.org/debian-lts-announce/2023/06/msg00019.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3VSMLJX25MXGQ6A7UPOGK7VPUVDESPHL/Mailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NB7LDZM5AGWC5BHHQHW6CP5OFNBBKFOQ/Mailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.debian.org/security/2023/dsa-5441Mailing List, Third Party Advisory
Impacted products

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:maradns:maradns:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B06D3BDE-E474-4282-BF95-36BBFC7DCB53",
              "versionEndExcluding": "3.4.10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:maradns:maradns:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9D11300-04B9-4D84-8717-BFF7B49C8CC9",
              "versionEndExcluding": "3.5.0036",
              "versionStartIncluding": "3.5.0001",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
              "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "MaraDNS is open-source software that implements the Domain Name System (DNS). In version 3.5.0024 and prior, a remotely exploitable integer underflow vulnerability in the DNS packet decompression function allows an attacker to cause a Denial of Service by triggering an abnormal program termination.\n\nThe vulnerability exists in the `decomp_get_rddata` function within the `Decompress.c` file. When handling a DNS packet with an Answer RR of qtype 16 (TXT record) and any qclass, if the `rdlength` is smaller than `rdata`, the result of the line `Decompress.c:886` is a negative number `len = rdlength - total;`. This value is then passed to the `decomp_append_bytes` function without proper validation, causing the program to attempt to allocate a massive chunk of memory that is impossible to allocate. Consequently, the program exits with an error code of 64, causing a Denial of Service.\n\nOne proposed fix for this vulnerability is to patch `Decompress.c:887` by breaking `if(len \u003c= 0)`, which has been incorporated in version 3.5.0036 via commit bab062bde40b2ae8a91eecd522e84d8b993bab58."
    }
  ],
  "id": "CVE-2023-31137",
  "lastModified": "2024-11-21T08:01:28.183",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "security-advisories@github.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-05-09T14:15:13.607",
  "references": [
    {
      "source": "security-advisories@github.com",
      "tags": [
        "Product"
      ],
      "url": "https://github.com/samboy/MaraDNS/blob/08b21ea20d80cedcb74aa8f14979ec7c61846663/dns/Decompress.c#L886"
    },
    {
      "source": "security-advisories@github.com",
      "tags": [
        "Patch"
      ],
      "url": "https://github.com/samboy/MaraDNS/commit/bab062bde40b2ae8a91eecd522e84d8b993bab58"
    },
    {
      "source": "security-advisories@github.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://github.com/samboy/MaraDNS/security/advisories/GHSA-58m7-826v-9c3c"
    },
    {
      "source": "security-advisories@github.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2023/06/msg00019.html"
    },
    {
      "source": "security-advisories@github.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3VSMLJX25MXGQ6A7UPOGK7VPUVDESPHL/"
    },
    {
      "source": "security-advisories@github.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NB7LDZM5AGWC5BHHQHW6CP5OFNBBKFOQ/"
    },
    {
      "source": "security-advisories@github.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://www.debian.org/security/2023/dsa-5441"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Product"
      ],
      "url": "https://github.com/samboy/MaraDNS/blob/08b21ea20d80cedcb74aa8f14979ec7c61846663/dns/Decompress.c#L886"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "https://github.com/samboy/MaraDNS/commit/bab062bde40b2ae8a91eecd522e84d8b993bab58"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://github.com/samboy/MaraDNS/security/advisories/GHSA-58m7-826v-9c3c"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2023/06/msg00019.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3VSMLJX25MXGQ6A7UPOGK7VPUVDESPHL/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NB7LDZM5AGWC5BHHQHW6CP5OFNBBKFOQ/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://www.debian.org/security/2023/dsa-5441"
    }
  ],
  "sourceIdentifier": "security-advisories@github.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-191"
        }
      ],
      "source": "security-advisories@github.com",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2022-30256

Vulnerability from fkie_nvd - Published: 2022-11-19 00:15 - Updated: 2025-04-29 15:15
Summary
An issue was discovered in MaraDNS Deadwood through 3.5.0021 that allows variant V1 of unintended domain name resolution. A revoked domain name can still be resolvable for a long time, including expired domains and taken-down malicious domains. The effects of an exploit would be widespread and highly impactful, because the exploitation conforms to de facto DNS specifications and operational practices, and overcomes current mitigation patches for "Ghost" domain names.
Impacted products
Vendor Product Version
maradns maradns *
maradns maradns *

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:maradns:maradns:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "043E0914-15F6-4D95-AA7D-367C131CCE2B",
              "versionEndExcluding": "3.4.03",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:maradns:maradns:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F46DBDE0-82CE-484D-8E75-0D6D61FEF83F",
              "versionEndExcluding": "3.5.0022",
              "versionStartIncluding": "3.5.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "An issue was discovered in MaraDNS Deadwood through 3.5.0021 that allows variant V1 of unintended domain name resolution. A revoked domain name can still be resolvable for a long time, including expired domains and taken-down malicious domains. The effects of an exploit would be widespread and highly impactful, because the exploitation conforms to de facto DNS specifications and operational practices, and overcomes current mitigation patches for \"Ghost\" domain names."
    },
    {
      "lang": "es",
      "value": "Se descubri\u00f3 un problema en MaraDNS Deadwood hasta 3.5.0021 que permite la variante V1 de resoluci\u00f3n de nombres de dominio no deseada. Un nombre de dominio revocado a\u00fan se puede resolver durante mucho tiempo, incluidos dominios caducados y dominios maliciosos eliminados. Los efectos de un exploit ser\u00edan generalizados y de gran impacto, porque la explotaci\u00f3n se ajusta a las especificaciones y pr\u00e1cticas operativas de DNS de facto, y supera los parches de mitigaci\u00f3n actuales para los nombres de dominio \"Ghost\""
    }
  ],
  "id": "CVE-2022-30256",
  "lastModified": "2025-04-29T15:15:47.353",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2022-11-19T00:15:10.497",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "https://lists.debian.org/debian-lts-announce/2023/06/msg00019.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3VSMLJX25MXGQ6A7UPOGK7VPUVDESPHL/"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NB7LDZM5AGWC5BHHQHW6CP5OFNBBKFOQ/"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Product",
        "Vendor Advisory"
      ],
      "url": "https://maradns.samiam.org/"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://maradns.samiam.org/security.html#CVE-2022-30256"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.debian.org/security/2023/dsa-5441"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.debian.org/debian-lts-announce/2023/06/msg00019.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3VSMLJX25MXGQ6A7UPOGK7VPUVDESPHL/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NB7LDZM5AGWC5BHHQHW6CP5OFNBBKFOQ/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Product",
        "Vendor Advisory"
      ],
      "url": "https://maradns.samiam.org/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://maradns.samiam.org/security.html#CVE-2022-30256"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.debian.org/security/2023/dsa-5441"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-672"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-672"
        }
      ],
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "type": "Secondary"
    }
  ]
}

FKIE_CVE-2012-1570

Vulnerability from fkie_nvd - Published: 2012-03-28 10:55 - Updated: 2025-04-11 00:51
Severity ?
Summary
The resolver in MaraDNS before 1.3.0.7.15 and 1.4.x before 1.4.12 overwrites cached server names and TTL values in NS records during the processing of a response to an A record query, which allows remote attackers to trigger continued resolvability of revoked domain names via a "ghost domain names" attack.
References
secalert@redhat.comhttp://osvdb.org/80192Broken Link
secalert@redhat.comhttp://secunia.com/advisories/48492Third Party Advisory
secalert@redhat.comhttp://www.maradns.org/changelog.htmlRelease Notes, Vendor Advisory
secalert@redhat.comhttp://www.openwall.com/lists/oss-security/2012/03/20/1Mailing List, Third Party Advisory
secalert@redhat.comhttp://www.openwall.com/lists/oss-security/2012/03/20/10Mailing List, Third Party Advisory
secalert@redhat.comhttp://www.securitytracker.com/id?1026821Third Party Advisory, VDB Entry
secalert@redhat.comhttps://bugzilla.redhat.com/show_bug.cgi?id=804770Issue Tracking, Third Party Advisory
secalert@redhat.comhttps://exchange.xforce.ibmcloud.com/vulnerabilities/74119Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://osvdb.org/80192Broken Link
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/48492Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.maradns.org/changelog.htmlRelease Notes, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2012/03/20/1Mailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2012/03/20/10Mailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id?1026821Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=804770Issue Tracking, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/74119Third Party Advisory, VDB Entry
Impacted products
Vendor Product Version
maradns maradns *
maradns maradns *

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:maradns:maradns:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D37FA9BB-A29F-4309-A5CB-A37FA16E4429",
              "versionEndExcluding": "1.3.07.15",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:maradns:maradns:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5ABC747D-B7F0-4463-ACB4-C47AA6D73C7D",
              "versionEndExcluding": "1.4.12",
              "versionStartIncluding": "1.4.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The resolver in MaraDNS before 1.3.0.7.15 and 1.4.x before 1.4.12 overwrites cached server names and TTL values in NS records during the processing of a response to an A record query, which allows remote attackers to trigger continued resolvability of revoked domain names via a \"ghost domain names\" attack."
    },
    {
      "lang": "es",
      "value": "La resoluci\u00f3n en MaraDNS antes de v1.3.0.7.15 y v1.4.x antes de v1.4.12 sobrescribe los nombres de cach\u00e9 del servidor y los valores TTL en los registros NS durante la tramitaci\u00f3n de una respuesta a una consulta de registro A, lo que permite a atacantes remotos provocar resoluci\u00f3n continua de nombres de dominio revocados a trav\u00e9s de un de ataque de \"nombres de dominio fantasmas."
    }
  ],
  "id": "CVE-2012-1570",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2012-03-28T10:55:00.317",
  "references": [
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Broken Link"
      ],
      "url": "http://osvdb.org/80192"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/48492"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Release Notes",
        "Vendor Advisory"
      ],
      "url": "http://www.maradns.org/changelog.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2012/03/20/1"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2012/03/20/10"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securitytracker.com/id?1026821"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=804770"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74119"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link"
      ],
      "url": "http://osvdb.org/80192"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/48492"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Release Notes",
        "Vendor Advisory"
      ],
      "url": "http://www.maradns.org/changelog.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2012/03/20/1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2012/03/20/10"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securitytracker.com/id?1026821"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=804770"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74119"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2011-5055

Vulnerability from fkie_nvd - Published: 2012-01-08 00:55 - Updated: 2025-04-11 00:51
Severity ?
Summary
MaraDNS 1.3.07.12 and 1.4.08 computes hash values for DNS data without properly restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted queries with the Recursion Desired (RD) bit set. NOTE: this issue exists because of an incomplete fix for CVE-2012-0024.
Impacted products
Vendor Product Version
maradns maradns 1.3.07.012
maradns maradns 1.4.08

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:maradns:maradns:1.3.07.012:*:*:*:*:*:*:*",
              "matchCriteriaId": "75502768-D541-4EB5-A3EB-54227C9FFCA4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:maradns:maradns:1.4.08:*:*:*:*:*:*:*",
              "matchCriteriaId": "09E33EAA-8C1B-44AC-A4BB-CF0D9DC02092",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "MaraDNS 1.3.07.12 and 1.4.08 computes hash values for DNS data without properly restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted queries with the Recursion Desired (RD) bit set.  NOTE: this issue exists because of an incomplete fix for CVE-2012-0024."
    },
    {
      "lang": "es",
      "value": "MaraDNS v1.3.07.12 y v1.4.08 calcula los valores hash de los datos DNS sin restringir la capacidad de desencadenar colisiones hash de forma predecible, lo que permite a atacantes remotos provocar una denegaci\u00f3n de servicio (consumo de CPU) mediante el env\u00edo de muchas consultas a mano con el bit Recursion Desired (recursividad deseada - RD) activado. NOTA: este problema existe debido a una soluci\u00f3n incompleta para CVE-2012-0024."
    }
  ],
  "id": "CVE-2011-5055",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2012-01-08T00:55:03.503",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://openwall.com/lists/oss-security/2012/01/03/13"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://openwall.com/lists/oss-security/2012/01/03/6"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://samiam.org/blog/20111230.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=771428"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://openwall.com/lists/oss-security/2012/01/03/13"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://openwall.com/lists/oss-security/2012/01/03/6"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://samiam.org/blog/20111230.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=771428"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2011-5056

Vulnerability from fkie_nvd - Published: 2012-01-08 00:55 - Updated: 2025-04-11 00:51
Severity ?
Summary
The authoritative server in MaraDNS through 2.0.04 computes hash values for DNS data without restricting the ability to trigger hash collisions predictably, which might allow local users to cause a denial of service (CPU consumption) via crafted records in zone files, a different vulnerability than CVE-2012-0024.
Impacted products
Vendor Product Version
maradns maradns *

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:maradns:maradns:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "586F8C0D-D3B6-41AD-9522-F8ABDCBD3562",
              "versionEndIncluding": "2.0.04",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The authoritative server in MaraDNS through 2.0.04 computes hash values for DNS data without restricting the ability to trigger hash collisions predictably, which might allow local users to cause a denial of service (CPU consumption) via crafted records in zone files, a different vulnerability than CVE-2012-0024."
    },
    {
      "lang": "es",
      "value": "El servidor autoritativo en maraDNS hasta la versi\u00f3n v2.0.04 calcula los valores hash de los datos del DNS sin restringir la capacidad de obtener colisiones de hash de una forma predecible. Esto podr\u00eda permitir a usuarios locales provocar una denegaci\u00f3n de servicio (consumo de CPU) a trav\u00e9s de registros debidamente modificados en los archivos de zona. Se trata de una vulnerabilidad diferente a CVE-2012-0024."
    }
  ],
  "id": "CVE-2011-5056",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 2.1,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2012-01-08T00:55:03.550",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Third Party Advisory"
      ],
      "url": "http://samiam.org/blog/20111229.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securitytracker.com/id?1026820"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72258"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Third Party Advisory"
      ],
      "url": "http://samiam.org/blog/20111229.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securitytracker.com/id?1026820"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72258"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-400"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2012-0024

Vulnerability from fkie_nvd - Published: 2012-01-08 00:55 - Updated: 2025-04-11 00:51
Severity ?
Summary
MaraDNS before 1.3.07.12 and 1.4.x before 1.4.08 computes hash values for DNS data without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted queries with the Recursion Desired (RD) bit set.
Impacted products
Vendor Product Version
maradns maradns *
maradns maradns *

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:maradns:maradns:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "31D1C086-CDF1-4A18-942A-34378F9ADC2A",
              "versionEndExcluding": "1.3.07.12",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:maradns:maradns:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5AF0F73F-81E3-42B3-A9DC-5E6233083BF3",
              "versionEndExcluding": "1.4.08",
              "versionStartIncluding": "1.4.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "MaraDNS before 1.3.07.12 and 1.4.x before 1.4.08 computes hash values for DNS data without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted queries with the Recursion Desired (RD) bit set."
    },
    {
      "lang": "es",
      "value": "MaraDNS antes de v1.3.07.12 y v1.4.x antes de v1.4.08 calcula los valores hash de los datos del DNS sin restringir la capacidad de obtener colisiones hash de una forma predecible. Esto permite a atacantes remotos provocar una denegaci\u00f3n de servicio (por consumo de CPU) mediante el env\u00edo de muchas consultas debidamente modificadas con el bit Recursion Desired (recursividad deseada - RD) activado."
    }
  ],
  "id": "CVE-2012-0024",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.8,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2012-01-08T00:55:03.597",
  "references": [
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://openwall.com/lists/oss-security/2012/01/03/13"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://openwall.com/lists/oss-security/2012/01/03/6"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch",
        "Third Party Advisory"
      ],
      "url": "http://samiam.org/blog/20111229.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=771428"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://openwall.com/lists/oss-security/2012/01/03/13"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://openwall.com/lists/oss-security/2012/01/03/6"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Third Party Advisory"
      ],
      "url": "http://samiam.org/blog/20111229.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=771428"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-400"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2011-0520

Vulnerability from fkie_nvd - Published: 2011-01-28 16:00 - Updated: 2025-04-11 00:51
Severity ?
Summary
The compress_add_dlabel_points function in dns/Compress.c in MaraDNS 1.4.03, 1.4.05, and probably other versions allows remote attackers to cause a denial of service (segmentation fault) and possibly execute arbitrary code via a long DNS hostname with a large number of labels, which triggers a heap-based buffer overflow.
References
secalert@redhat.comhttp://bugs.debian.org/cgi-bin/bugreport.cgi?bug=610834
secalert@redhat.comhttp://osvdb.org/70630
secalert@redhat.comhttp://secunia.com/advisories/43027Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/43107
secalert@redhat.comhttp://www.debian.org/security/2011/dsa-2196
secalert@redhat.comhttp://www.openwall.com/lists/oss-security/2011/01/24/1
secalert@redhat.comhttp://www.openwall.com/lists/oss-security/2011/01/24/6
secalert@redhat.comhttp://www.securityfocus.com/bid/45966
secalert@redhat.comhttp://www.vupen.com/english/advisories/2011/0699
secalert@redhat.comhttps://exchange.xforce.ibmcloud.com/vulnerabilities/64885
af854a3a-2127-422b-91ae-364da2661108http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=610834
af854a3a-2127-422b-91ae-364da2661108http://osvdb.org/70630
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/43027Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/43107
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2011/dsa-2196
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2011/01/24/1
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2011/01/24/6
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/45966
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2011/0699
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/64885
Impacted products
Vendor Product Version
maradns maradns 1.4.03
maradns maradns 1.4.05

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:maradns:maradns:1.4.03:*:*:*:*:*:*:*",
              "matchCriteriaId": "3F496D23-5A2F-4C76-A02B-9B3A8C143D1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:maradns:maradns:1.4.05:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3696E4F-7680-4DF5-8A46-440B6F4774C9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The compress_add_dlabel_points function in dns/Compress.c in MaraDNS 1.4.03, 1.4.05, and probably other versions allows remote attackers to cause a denial of service (segmentation fault) and possibly execute arbitrary code via a long DNS hostname with a large number of labels, which triggers a heap-based buffer overflow."
    },
    {
      "lang": "es",
      "value": "La funci\u00f3n compress_add_dlabel_points en dns/Compress.c de MaraDNS v1.4.03, v1.4.05 y puede que otras versiones, permite a atacantes remotos provocar una denegaci\u00f3n de servicio (fallo de segmentaci\u00f3n) y posibilidad de ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de un nombre de DNS largo con un largo n\u00famero de etiquetas, esto provoca un desbordamiento de b\u00fafer basado en memoria din\u00e1mica."
    }
  ],
  "id": "CVE-2011-0520",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2011-01-28T16:00:04.673",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=610834"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://osvdb.org/70630"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/43027"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/43107"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.debian.org/security/2011/dsa-2196"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.openwall.com/lists/oss-security/2011/01/24/1"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.openwall.com/lists/oss-security/2011/01/24/6"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/bid/45966"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.vupen.com/english/advisories/2011/0699"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64885"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=610834"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/70630"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/43027"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/43107"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2011/dsa-2196"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2011/01/24/1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2011/01/24/6"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/45966"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2011/0699"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64885"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2010-2444

Vulnerability from fkie_nvd - Published: 2010-06-25 18:30 - Updated: 2025-04-11 00:51
Severity ?
Summary
parse/Csv2_parse.c in MaraDNS 1.3.03, and other versions before 1.4.03, does not properly handle hostnames that do not end in a "." (dot) character, which allows remote attackers to cause a denial of service (NULL pointer dereference) via a crafted csv2 zone file.
Impacted products
Vendor Product Version
maradns maradns 1.3.03
maradns maradns 1.3.04
maradns maradns 1.3.05
maradns maradns 1.3.06
maradns maradns 1.3.07.01
maradns maradns 1.3.07.02
maradns maradns 1.3.07.03
maradns maradns 1.3.07.04
maradns maradns 1.3.07.05
maradns maradns 1.3.07.06
maradns maradns 1.3.07.07
maradns maradns 1.3.07.08
maradns maradns 1.3.07.09
maradns maradns 1.3.08
maradns maradns 1.3.09
maradns maradns 1.3.10
maradns maradns 1.3.11
maradns maradns 1.3.12
maradns maradns 1.3.13
maradns maradns 1.3.14
maradns maradns 1.4.01
maradns maradns 1.4.02

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:maradns:maradns:1.3.03:*:*:*:*:*:*:*",
              "matchCriteriaId": "4152EC32-1A1E-4C8E-BF22-7E610D9EE3C8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:maradns:maradns:1.3.04:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB9E2D75-5874-4115-B8A1-BDB363C1578D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:maradns:maradns:1.3.05:*:*:*:*:*:*:*",
              "matchCriteriaId": "48DB2061-1E36-4C1B-AA12-84C143D0A270",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:maradns:maradns:1.3.06:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE3C6973-CDB3-45F9-BD43-0C74B231FFB8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:maradns:maradns:1.3.07.01:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA6C5C7B-02E6-4AC4-99A6-2D50BA66CED0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:maradns:maradns:1.3.07.02:*:*:*:*:*:*:*",
              "matchCriteriaId": "05BF942C-EF7E-4320-AF8A-8BEEDDEE4D41",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:maradns:maradns:1.3.07.03:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D3D577E-F9DC-4616-9A6A-402C212D5A70",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:maradns:maradns:1.3.07.04:*:*:*:*:*:*:*",
              "matchCriteriaId": "4DA50FF0-7BE7-4B3F-B27F-37539D4D9D4F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:maradns:maradns:1.3.07.05:*:*:*:*:*:*:*",
              "matchCriteriaId": "5BF9CAA0-24E8-4D13-BABC-40BFF5B97D60",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:maradns:maradns:1.3.07.06:*:*:*:*:*:*:*",
              "matchCriteriaId": "987E3CDC-C578-4850-850F-BB92F88D72B3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:maradns:maradns:1.3.07.07:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6464C92-02BF-4591-89B0-F7D7826E2B76",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:maradns:maradns:1.3.07.08:*:*:*:*:*:*:*",
              "matchCriteriaId": "755494B1-8F52-420D-8AC8-D8DAD6D093D6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:maradns:maradns:1.3.07.09:*:*:*:*:*:*:*",
              "matchCriteriaId": "BCF1FE9C-CB27-4306-B5A1-ADC4CC2BFA00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:maradns:maradns:1.3.08:*:*:*:*:*:*:*",
              "matchCriteriaId": "4CA71AE3-2704-4662-8219-53C2D27EEB17",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:maradns:maradns:1.3.09:*:*:*:*:*:*:*",
              "matchCriteriaId": "C1C9763D-55F2-4776-AD68-D446B62FC1CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:maradns:maradns:1.3.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "349F8D05-64B6-4681-B7C0-2901348A796A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:maradns:maradns:1.3.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A88619F-859A-4FD4-9D41-FB99B5C3ABE2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:maradns:maradns:1.3.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "41A5E951-950C-489F-8837-FC12651C723B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:maradns:maradns:1.3.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFC05DB6-60B4-4C7E-B57F-B5CCEFD41428",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:maradns:maradns:1.3.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "411BC0D2-75BF-4E90-BCE4-228AB5821EA9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:maradns:maradns:1.4.01:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CFA46FC-7283-4877-A943-1CEBC933BF9E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:maradns:maradns:1.4.02:*:*:*:*:*:*:*",
              "matchCriteriaId": "9DD92FB9-0F1D-4A8D-9F22-94CE5A2FC949",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "parse/Csv2_parse.c in MaraDNS 1.3.03, and other versions before 1.4.03, does not properly handle hostnames that do not end in a \".\" (dot) character, which allows remote attackers to cause a denial of service (NULL pointer dereference) via a crafted csv2 zone file."
    },
    {
      "lang": "es",
      "value": "parse/Csv2_parse.c en MaraDNS V1.3.03, y otras versiones anteriores v1.4.03 no maneja adecuadamente los hombres host que no terminan en el caracter \".\" (punto), lo que permite a atacantes remotos causar una denegaci\u00f3n de servicio (desreferencia de puntero nulo) a trav\u00e9s de fichero csv2 zone manipulado. \r\n"
    }
  ],
  "evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/476.html\r\n\r\n\u0027NULL Pointer Dereference\u0027",
  "id": "CVE-2010-2444",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2010-06-25T18:30:01.610",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://maradns.org/download/maradns-1.4.02-parse_segfault.patch"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2010/06/09/4"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.openwall.com/lists/oss-security/2010/06/24/5"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://maradns.org/download/maradns-1.4.02-parse_segfault.patch"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2010/06/09/4"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2010/06/24/5"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2008-0061

Vulnerability from fkie_nvd - Published: 2008-01-03 22:46 - Updated: 2025-04-09 00:30
Severity ?
Summary
MaraDNS 1.0 before 1.0.41, 1.2 before 1.2.12.08, and 1.3 before 1.3.07.04 allows remote attackers to cause a denial of service via a crafted DNS packet that prevents an authoritative name (CNAME) record from resolving, aka "improper rotation of resource records."
Impacted products
Vendor Product Version
maradns maradns 1.0.00
maradns maradns 1.0.01
maradns maradns 1.0.02
maradns maradns 1.0.03
maradns maradns 1.0.04
maradns maradns 1.0.05
maradns maradns 1.0.06
maradns maradns 1.0.07
maradns maradns 1.0.08
maradns maradns 1.0.09
maradns maradns 1.0.10
maradns maradns 1.0.11
maradns maradns 1.0.12
maradns maradns 1.0.13
maradns maradns 1.0.14
maradns maradns 1.0.15
maradns maradns 1.0.16
maradns maradns 1.0.17
maradns maradns 1.0.18
maradns maradns 1.0.19
maradns maradns 1.0.20
maradns maradns 1.0.21
maradns maradns 1.0.22
maradns maradns 1.0.23
maradns maradns 1.0.24
maradns maradns 1.0.25
maradns maradns 1.0.26
maradns maradns 1.0.27
maradns maradns 1.0.28
maradns maradns 1.0.29
maradns maradns 1.0.30
maradns maradns 1.0.31
maradns maradns 1.0.32
maradns maradns 1.0.33
maradns maradns 1.0.34
maradns maradns 1.0.35
maradns maradns 1.0.36
maradns maradns 1.0.37
maradns maradns 1.0.38
maradns maradns 1.0.39
maradns maradns 1.2.12.01
maradns maradns 1.2.12.02
maradns maradns 1.2.12.03
maradns maradns 1.2.12.04
maradns maradns 1.2.12.05
maradns maradns 1.2.12.06
maradns maradns 1.2.12.07
maradns maradns 1.3.01
maradns maradns 1.3.02
maradns maradns 1.3.03
maradns maradns 1.3.04
maradns maradns 1.3.05
maradns maradns 1.3.06
maradns maradns 1.3.07
maradns maradns 1.3.07.01
maradns maradns 1.3.07.02
maradns maradns 1.3.07.03

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:maradns:maradns:1.0.00:*:*:*:*:*:*:*",
              "matchCriteriaId": "D9A4B65E-015A-412B-9843-B6BB2136B43A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:maradns:maradns:1.0.01:*:*:*:*:*:*:*",
              "matchCriteriaId": "F54B62CF-C5F1-4F6B-BE54-0C096A745EB4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:maradns:maradns:1.0.02:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9DA12C9-1A78-484A-96AB-1037E537CF2A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:maradns:maradns:1.0.03:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B9A8DB0-A40C-434C-9E9E-04CEA4FA24B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:maradns:maradns:1.0.04:*:*:*:*:*:*:*",
              "matchCriteriaId": "43AB9078-D426-4396-8065-7C34978B21A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:maradns:maradns:1.0.05:*:*:*:*:*:*:*",
              "matchCriteriaId": "C3936CB1-71E2-4BEA-8F49-9BA29CA92573",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:maradns:maradns:1.0.06:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE579661-78BC-42E7-84AF-711AC1B9ADEC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:maradns:maradns:1.0.07:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA384650-1036-4A40-9979-13EA35EA57BA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:maradns:maradns:1.0.08:*:*:*:*:*:*:*",
              "matchCriteriaId": "78B58BC6-748F-4878-94B0-710EF66074E5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:maradns:maradns:1.0.09:*:*:*:*:*:*:*",
              "matchCriteriaId": "98050C87-BE9A-4E7D-9022-B1E2F897127D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:maradns:maradns:1.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE75A373-9E93-4394-93F0-E08CD8306373",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:maradns:maradns:1.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E7B591C-FA73-4EA3-A04F-607FCD771599",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:maradns:maradns:1.0.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CD4B6EC-C8F7-449A-9B7F-06D60B40F97C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:maradns:maradns:1.0.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "56A5F70F-B3FA-4934-AD74-18924343AE9F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:maradns:maradns:1.0.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD8D24C0-94D6-4B43-9C34-239D676CF6C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:maradns:maradns:1.0.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "76239525-7DBD-42A5-BB6C-BF532BCBE36F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:maradns:maradns:1.0.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD12723C-2A61-4484-9C2B-2BF2EE53FE5C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:maradns:maradns:1.0.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "9FE55FB2-3A1D-44DF-B76D-9F33AEDF896C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:maradns:maradns:1.0.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C909136-CFE5-496F-A3FD-40D9006EEA7E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:maradns:maradns:1.0.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9E1E2A9-5D12-4B33-B678-B25CE640481F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:maradns:maradns:1.0.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "FBD35BC4-3AB7-4BED-B7BC-D289DF05C36D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:maradns:maradns:1.0.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD2A8D02-4020-404A-B784-CA154FAE701B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:maradns:maradns:1.0.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "35AB42F8-E1E1-4D28-874D-9C04581C1234",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:maradns:maradns:1.0.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "C1323AB3-2BF5-4D59-B181-A7A0AE48F3FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:maradns:maradns:1.0.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AE5E808-5B6F-47DC-AA64-85EB9E0C4018",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:maradns:maradns:1.0.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "15119E09-C516-4FD8-BCB6-8E7A2E522C17",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:maradns:maradns:1.0.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "61DCD6E4-5F86-4713-A6AE-67A2AD209E12",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:maradns:maradns:1.0.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD52F8FC-0A86-4695-99DD-3785291FA461",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:maradns:maradns:1.0.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "70BC41A6-FCCC-4624-81AC-6B54A4C5371C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:maradns:maradns:1.0.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "00B76451-E05D-4CE0-A3FE-01DCACCDA870",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:maradns:maradns:1.0.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "540F0664-587E-43AA-8D47-576D71A913C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:maradns:maradns:1.0.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "816E6F57-FFC3-4E58-952A-0E31322849C0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:maradns:maradns:1.0.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "127762D9-E951-4F43-8D0E-4A41620FE80B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:maradns:maradns:1.0.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "F193DACC-6E51-4689-BD1B-F1731DFBA264",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:maradns:maradns:1.0.34:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0159BDF-2247-4FF1-A180-0A15CF066933",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:maradns:maradns:1.0.35:*:*:*:*:*:*:*",
              "matchCriteriaId": "048813A2-40FD-4C2D-8AA6-83B51DFFBAB8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:maradns:maradns:1.0.36:*:*:*:*:*:*:*",
              "matchCriteriaId": "22C134FF-A76D-4CAF-BB05-739D00CC5116",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:maradns:maradns:1.0.37:*:*:*:*:*:*:*",
              "matchCriteriaId": "33950A35-F9FC-4F14-9477-0F1C495772A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:maradns:maradns:1.0.38:*:*:*:*:*:*:*",
              "matchCriteriaId": "A606A9F3-60D4-4A1C-9D77-41E509DCE3C1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:maradns:maradns:1.0.39:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF72C265-7E42-494E-BB52-65CAD1756DC5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:maradns:maradns:1.2.12.01:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C66798F-5DAF-414F-91A8-22CF33BABEF7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:maradns:maradns:1.2.12.02:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A22A70C-EF0B-4A82-BE88-0D32F4408073",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:maradns:maradns:1.2.12.03:*:*:*:*:*:*:*",
              "matchCriteriaId": "35453D24-5C87-4723-8B10-AB9EF176AB15",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:maradns:maradns:1.2.12.04:*:*:*:*:*:*:*",
              "matchCriteriaId": "97BC2590-19DC-478D-A800-8EB06280BF99",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:maradns:maradns:1.2.12.05:*:*:*:*:*:*:*",
              "matchCriteriaId": "6428BA29-DAB0-4885-9704-74801BDF6A55",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:maradns:maradns:1.2.12.06:*:*:*:*:*:*:*",
              "matchCriteriaId": "50977CFA-6AB1-464B-A355-0A105505D1BA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:maradns:maradns:1.2.12.07:*:*:*:*:*:*:*",
              "matchCriteriaId": "C43A3F3F-536D-4DE4-942A-167DCB010E38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:maradns:maradns:1.3.01:*:*:*:*:*:*:*",
              "matchCriteriaId": "965A94F4-9DE1-4E76-A630-0BFA1B725708",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:maradns:maradns:1.3.02:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E7C14B5-830E-4234-9DE2-A4E9FA2B9DB7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:maradns:maradns:1.3.03:*:*:*:*:*:*:*",
              "matchCriteriaId": "4152EC32-1A1E-4C8E-BF22-7E610D9EE3C8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:maradns:maradns:1.3.04:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB9E2D75-5874-4115-B8A1-BDB363C1578D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:maradns:maradns:1.3.05:*:*:*:*:*:*:*",
              "matchCriteriaId": "48DB2061-1E36-4C1B-AA12-84C143D0A270",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:maradns:maradns:1.3.06:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE3C6973-CDB3-45F9-BD43-0C74B231FFB8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:maradns:maradns:1.3.07:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A2E173B-5A4B-455F-A7AE-9DEBD17DAB9D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:maradns:maradns:1.3.07.01:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA6C5C7B-02E6-4AC4-99A6-2D50BA66CED0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:maradns:maradns:1.3.07.02:*:*:*:*:*:*:*",
              "matchCriteriaId": "05BF942C-EF7E-4320-AF8A-8BEEDDEE4D41",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:maradns:maradns:1.3.07.03:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D3D577E-F9DC-4616-9A6A-402C212D5A70",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "MaraDNS 1.0 before 1.0.41, 1.2 before 1.2.12.08, and 1.3 before 1.3.07.04 allows remote attackers to cause a denial of service via a crafted DNS packet that prevents an authoritative name (CNAME) record from resolving, aka \"improper rotation of resource records.\""
    },
    {
      "lang": "es",
      "value": "MaraDNS 1.0 versiones anteriores a 1.0.41, 1.2 versiones anteriores a 1.2.12.08, y 1.3 versiones anteriores a 1.3.07.04 permite a atacantes remotos provocar una denegaci\u00f3n de servicio mediante un paquete DNS manipulado que evita que un registro de nombre autorizado (CNAME) sea resuelto, tambi\u00e9n conocido como \"rotaci\u00f3n inapropiada de registros de recursos\"."
    }
  ],
  "id": "CVE-2008-0061",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2008-01-03T22:46:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://bugs.gentoo.org/show_bug.cgi?id=204351"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://maradns.blogspot.com/2007/08/maradns-update-all-versions.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/28329"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/28334"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/28650"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://security.gentoo.org/glsa/glsa-200801-16.xml"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2008/dsa-1445"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.maradns.org/changelog.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/27124"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2008/0026"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://bugs.gentoo.org/show_bug.cgi?id=204351"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://maradns.blogspot.com/2007/08/maradns-update-all-versions.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/28329"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/28334"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/28650"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://security.gentoo.org/glsa/glsa-200801-16.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2008/dsa-1445"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.maradns.org/changelog.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/27124"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2008/0026"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2007-3116

Vulnerability from fkie_nvd - Published: 2007-06-07 21:30 - Updated: 2025-04-09 00:30
Severity ?
Summary
Memory leak in server/MaraDNS.c in MaraDNS 1.2.12.06 and 1.3.05 allows remote attackers to cause a denial of service (memory consumption) via unspecified vectors, a different set of affected versions than CVE-2007-3114 and CVE-2007-3115.
Impacted products
Vendor Product Version
maradns maradns 1.2.12.06
maradns maradns 1.3.05

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:maradns:maradns:1.2.12.06:*:*:*:*:*:*:*",
              "matchCriteriaId": "50977CFA-6AB1-464B-A355-0A105505D1BA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:maradns:maradns:1.3.05:*:*:*:*:*:*:*",
              "matchCriteriaId": "48DB2061-1E36-4C1B-AA12-84C143D0A270",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Memory leak in server/MaraDNS.c in MaraDNS 1.2.12.06 and 1.3.05 allows remote attackers to cause a denial of service (memory consumption) via unspecified vectors, a different set of affected versions than CVE-2007-3114 and CVE-2007-3115."
    },
    {
      "lang": "es",
      "value": "Una p\u00e9rdida de memoria en el archivo server/MaraDNS.c en MaraDNS versiones 1.2.12.06 y 1.3.05, permite a atacantes remotos causar una denegaci\u00f3n de servicio (consumo de memoria) por medio de vectores no especificados, un conjunto de versiones afectadas diferentes de CVE-2007-3114 y CVE-2007-3115."
    }
  ],
  "id": "CVE-2007-3116",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2007-06-07T21:30:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://maradns.blogspot.com/search/label/MaraDNS"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://osvdb.org/37016"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/25767"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2007/dsa-1319"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://maradns.blogspot.com/search/label/MaraDNS"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/37016"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/25767"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2007/dsa-1319"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-399"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2007-3114

Vulnerability from fkie_nvd - Published: 2007-06-07 21:30 - Updated: 2025-04-09 00:30
Severity ?
Summary
Memory leak in server/MaraDNS.c in MaraDNS before 1.2.12.05, and 1.3.x before 1.3.03, allows remote attackers to cause a denial of service (memory consumption) via unspecified vectors, a different set of affected versions than CVE-2007-3115 and CVE-2007-3116.
Impacted products
Vendor Product Version
maradns maradns 1.2.12.01
maradns maradns 1.2.12.02
maradns maradns 1.2.12.03
maradns maradns 1.2.12.04
maradns maradns 1.3.01
maradns maradns 1.3.02

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:maradns:maradns:1.2.12.01:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C66798F-5DAF-414F-91A8-22CF33BABEF7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:maradns:maradns:1.2.12.02:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A22A70C-EF0B-4A82-BE88-0D32F4408073",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:maradns:maradns:1.2.12.03:*:*:*:*:*:*:*",
              "matchCriteriaId": "35453D24-5C87-4723-8B10-AB9EF176AB15",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:maradns:maradns:1.2.12.04:*:*:*:*:*:*:*",
              "matchCriteriaId": "97BC2590-19DC-478D-A800-8EB06280BF99",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:maradns:maradns:1.3.01:*:*:*:*:*:*:*",
              "matchCriteriaId": "965A94F4-9DE1-4E76-A630-0BFA1B725708",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:maradns:maradns:1.3.02:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E7C14B5-830E-4234-9DE2-A4E9FA2B9DB7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Memory leak in server/MaraDNS.c in MaraDNS before 1.2.12.05, and 1.3.x before 1.3.03, allows remote attackers to cause a denial of service (memory consumption) via unspecified vectors, a different set of affected versions than CVE-2007-3115 and CVE-2007-3116."
    },
    {
      "lang": "es",
      "value": "Una p\u00e9rdida de memoria en el archivo server/MaraDNS.c en MaraDNS versiones anteriores a 1.2.12.05, y versiones 1.3.x anteriores a 1.3.03, permite a atacantes remotos causar una denegaci\u00f3n de servicio (consumo de memoria) por medio de vectores no especificados, un conjunto de versiones afectadas diferentes de CVE-2007-3115 y CVE-2007-3116."
    }
  ],
  "id": "CVE-2007-3114",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2007-06-07T21:30:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://osvdb.org/37018"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/25406"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/25767"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://superb-west.dl.sourceforge.net/sourceforge/maradns/maradns-1.2.12.05.tar.gz"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2007/dsa-1319"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.maradns.org/changelog.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/24337"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/37018"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/25406"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/25767"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://superb-west.dl.sourceforge.net/sourceforge/maradns/maradns-1.2.12.05.tar.gz"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2007/dsa-1319"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.maradns.org/changelog.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/24337"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-399"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

CVE-2023-31137 (GCVE-0-2023-31137)

Vulnerability from cvelistv5 – Published: 2023-05-09 13:56 – Updated: 2025-02-13 16:49
VLAI?
Summary
MaraDNS is open-source software that implements the Domain Name System (DNS). In version 3.5.0024 and prior, a remotely exploitable integer underflow vulnerability in the DNS packet decompression function allows an attacker to cause a Denial of Service by triggering an abnormal program termination. The vulnerability exists in the `decomp_get_rddata` function within the `Decompress.c` file. When handling a DNS packet with an Answer RR of qtype 16 (TXT record) and any qclass, if the `rdlength` is smaller than `rdata`, the result of the line `Decompress.c:886` is a negative number `len = rdlength - total;`. This value is then passed to the `decomp_append_bytes` function without proper validation, causing the program to attempt to allocate a massive chunk of memory that is impossible to allocate. Consequently, the program exits with an error code of 64, causing a Denial of Service. One proposed fix for this vulnerability is to patch `Decompress.c:887` by breaking `if(len <= 0)`, which has been incorporated in version 3.5.0036 via commit bab062bde40b2ae8a91eecd522e84d8b993bab58.
CWE
  • CWE-191 - Integer Underflow (Wrap or Wraparound)
Assigner
Impacted products
Vendor Product Version
samboy MaraDNS Affected: <= 3.5.0024
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T14:45:25.771Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "https://github.com/samboy/MaraDNS/security/advisories/GHSA-58m7-826v-9c3c",
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://github.com/samboy/MaraDNS/security/advisories/GHSA-58m7-826v-9c3c"
          },
          {
            "name": "https://github.com/samboy/MaraDNS/commit/bab062bde40b2ae8a91eecd522e84d8b993bab58",
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://github.com/samboy/MaraDNS/commit/bab062bde40b2ae8a91eecd522e84d8b993bab58"
          },
          {
            "name": "https://github.com/samboy/MaraDNS/blob/08b21ea20d80cedcb74aa8f14979ec7c61846663/dns/Decompress.c#L886",
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://github.com/samboy/MaraDNS/blob/08b21ea20d80cedcb74aa8f14979ec7c61846663/dns/Decompress.c#L886"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NB7LDZM5AGWC5BHHQHW6CP5OFNBBKFOQ/"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3VSMLJX25MXGQ6A7UPOGK7VPUVDESPHL/"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2023/06/msg00019.html"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.debian.org/security/2023/dsa-5441"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-31137",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-03-08T16:26:06.644708Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-11-27T16:19:59.296Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MaraDNS",
          "vendor": "samboy",
          "versions": [
            {
              "status": "affected",
              "version": "\u003c= 3.5.0024"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "MaraDNS is open-source software that implements the Domain Name System (DNS). In version 3.5.0024 and prior, a remotely exploitable integer underflow vulnerability in the DNS packet decompression function allows an attacker to cause a Denial of Service by triggering an abnormal program termination.\n\nThe vulnerability exists in the `decomp_get_rddata` function within the `Decompress.c` file. When handling a DNS packet with an Answer RR of qtype 16 (TXT record) and any qclass, if the `rdlength` is smaller than `rdata`, the result of the line `Decompress.c:886` is a negative number `len = rdlength - total;`. This value is then passed to the `decomp_append_bytes` function without proper validation, causing the program to attempt to allocate a massive chunk of memory that is impossible to allocate. Consequently, the program exits with an error code of 64, causing a Denial of Service.\n\nOne proposed fix for this vulnerability is to patch `Decompress.c:887` by breaking `if(len \u003c= 0)`, which has been incorporated in version 3.5.0036 via commit bab062bde40b2ae8a91eecd522e84d8b993bab58."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-191",
              "description": "CWE-191: Integer Underflow (Wrap or Wraparound)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-06-29T11:06:15.332Z",
        "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
        "shortName": "GitHub_M"
      },
      "references": [
        {
          "name": "https://github.com/samboy/MaraDNS/security/advisories/GHSA-58m7-826v-9c3c",
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://github.com/samboy/MaraDNS/security/advisories/GHSA-58m7-826v-9c3c"
        },
        {
          "name": "https://github.com/samboy/MaraDNS/commit/bab062bde40b2ae8a91eecd522e84d8b993bab58",
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/samboy/MaraDNS/commit/bab062bde40b2ae8a91eecd522e84d8b993bab58"
        },
        {
          "name": "https://github.com/samboy/MaraDNS/blob/08b21ea20d80cedcb74aa8f14979ec7c61846663/dns/Decompress.c#L886",
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/samboy/MaraDNS/blob/08b21ea20d80cedcb74aa8f14979ec7c61846663/dns/Decompress.c#L886"
        },
        {
          "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NB7LDZM5AGWC5BHHQHW6CP5OFNBBKFOQ/"
        },
        {
          "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3VSMLJX25MXGQ6A7UPOGK7VPUVDESPHL/"
        },
        {
          "url": "https://lists.debian.org/debian-lts-announce/2023/06/msg00019.html"
        },
        {
          "url": "https://www.debian.org/security/2023/dsa-5441"
        }
      ],
      "source": {
        "advisory": "GHSA-58m7-826v-9c3c",
        "discovery": "UNKNOWN"
      },
      "title": "MaraDNS Integer Underflow Vulnerability in DNS Packet Decompression"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
    "assignerShortName": "GitHub_M",
    "cveId": "CVE-2023-31137",
    "datePublished": "2023-05-09T13:56:46.219Z",
    "dateReserved": "2023-04-24T21:44:10.417Z",
    "dateUpdated": "2025-02-13T16:49:46.296Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2022-30256 (GCVE-0-2022-30256)

Vulnerability from cvelistv5 – Published: 2022-11-18 00:00 – Updated: 2025-04-29 14:40
VLAI?
Summary
An issue was discovered in MaraDNS Deadwood through 3.5.0021 that allows variant V1 of unintended domain name resolution. A revoked domain name can still be resolvable for a long time, including expired domains and taken-down malicious domains. The effects of an exploit would be widespread and highly impactful, because the exploitation conforms to de facto DNS specifications and operational practices, and overcomes current mitigation patches for "Ghost" domain names.
CWE
  • n/a
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T06:40:47.864Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://maradns.samiam.org/"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://maradns.samiam.org/security.html#CVE-2022-30256"
          },
          {
            "name": "FEDORA-2023-0c012f6245",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NB7LDZM5AGWC5BHHQHW6CP5OFNBBKFOQ/"
          },
          {
            "name": "FEDORA-2023-cdce244fb8",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3VSMLJX25MXGQ6A7UPOGK7VPUVDESPHL/"
          },
          {
            "name": "[debian-lts-announce] 20230619 [SECURITY] [DLA 3457-1] maradns security update",
            "tags": [
              "mailing-list",
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2023/06/msg00019.html"
          },
          {
            "name": "DSA-5441",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://www.debian.org/security/2023/dsa-5441"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "NETWORK",
              "availabilityImpact": "NONE",
              "baseScore": 7.5,
              "baseSeverity": "HIGH",
              "confidentialityImpact": "NONE",
              "integrityImpact": "HIGH",
              "privilegesRequired": "NONE",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2022-30256",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-04-29T14:39:40.634132Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-672",
                "description": "CWE-672 Operation on a Resource after Expiration or Release",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-04-29T14:40:33.438Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "An issue was discovered in MaraDNS Deadwood through 3.5.0021 that allows variant V1 of unintended domain name resolution. A revoked domain name can still be resolvable for a long time, including expired domains and taken-down malicious domains. The effects of an exploit would be widespread and highly impactful, because the exploitation conforms to de facto DNS specifications and operational practices, and overcomes current mitigation patches for \"Ghost\" domain names."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-06-29T00:00:00.000Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "url": "https://maradns.samiam.org/"
        },
        {
          "url": "https://maradns.samiam.org/security.html#CVE-2022-30256"
        },
        {
          "name": "FEDORA-2023-0c012f6245",
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NB7LDZM5AGWC5BHHQHW6CP5OFNBBKFOQ/"
        },
        {
          "name": "FEDORA-2023-cdce244fb8",
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3VSMLJX25MXGQ6A7UPOGK7VPUVDESPHL/"
        },
        {
          "name": "[debian-lts-announce] 20230619 [SECURITY] [DLA 3457-1] maradns security update",
          "tags": [
            "mailing-list"
          ],
          "url": "https://lists.debian.org/debian-lts-announce/2023/06/msg00019.html"
        },
        {
          "name": "DSA-5441",
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://www.debian.org/security/2023/dsa-5441"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2022-30256",
    "datePublished": "2022-11-18T00:00:00.000Z",
    "dateReserved": "2022-05-04T00:00:00.000Z",
    "dateUpdated": "2025-04-29T14:40:33.438Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2012-1570 (GCVE-0-2012-1570)

Vulnerability from cvelistv5 – Published: 2012-03-28 10:00 – Updated: 2024-08-06 19:01
VLAI?
Summary
The resolver in MaraDNS before 1.3.0.7.15 and 1.4.x before 1.4.12 overwrites cached server names and TTL values in NS records during the processing of a response to an A record query, which allows remote attackers to trigger continued resolvability of revoked domain names via a "ghost domain names" attack.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.openwall.com/lists/oss-security/2012/0… mailing-listx_refsource_MLIST
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://www.openwall.com/lists/oss-security/2012/03/20/1 mailing-listx_refsource_MLIST
http://secunia.com/advisories/48492 third-party-advisoryx_refsource_SECUNIA
https://bugzilla.redhat.com/show_bug.cgi?id=804770 x_refsource_CONFIRM
http://osvdb.org/80192 vdb-entryx_refsource_OSVDB
http://www.securitytracker.com/id?1026821 vdb-entryx_refsource_SECTRACK
http://www.maradns.org/changelog.html x_refsource_CONFIRM
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T19:01:02.621Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "[oss-security] 20120320 Re: CVE request: maradns deleted domain record cache persistance flaw",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2012/03/20/10"
          },
          {
            "name": "maradns-domain-spoofing(74119)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74119"
          },
          {
            "name": "[oss-security] 20120319 CVE request: maradns deleted domain record cache persistance flaw",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2012/03/20/1"
          },
          {
            "name": "48492",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/48492"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=804770"
          },
          {
            "name": "80192",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/80192"
          },
          {
            "name": "1026821",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1026821"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.maradns.org/changelog.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2012-03-19T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The resolver in MaraDNS before 1.3.0.7.15 and 1.4.x before 1.4.12 overwrites cached server names and TTL values in NS records during the processing of a response to an A record query, which allows remote attackers to trigger continued resolvability of revoked domain names via a \"ghost domain names\" attack."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-12-12T19:57:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "[oss-security] 20120320 Re: CVE request: maradns deleted domain record cache persistance flaw",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2012/03/20/10"
        },
        {
          "name": "maradns-domain-spoofing(74119)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74119"
        },
        {
          "name": "[oss-security] 20120319 CVE request: maradns deleted domain record cache persistance flaw",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2012/03/20/1"
        },
        {
          "name": "48492",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/48492"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=804770"
        },
        {
          "name": "80192",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/80192"
        },
        {
          "name": "1026821",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1026821"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.maradns.org/changelog.html"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2012-1570",
    "datePublished": "2012-03-28T10:00:00",
    "dateReserved": "2012-03-12T00:00:00",
    "dateUpdated": "2024-08-06T19:01:02.621Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2012-0024 (GCVE-0-2012-0024)

Vulnerability from cvelistv5 – Published: 2012-01-08 00:00 – Updated: 2024-09-17 00:51
VLAI?
Summary
MaraDNS before 1.3.07.12 and 1.4.x before 1.4.08 computes hash values for DNS data without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted queries with the Recursion Desired (RD) bit set.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T18:09:17.254Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://samiam.org/blog/20111229.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=771428"
          },
          {
            "name": "[oss-security] 20120103 CVE request: maradns hash table collision cpu dos",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://openwall.com/lists/oss-security/2012/01/03/6"
          },
          {
            "name": "[oss-security] 20120103 Re: CVE request: maradns hash table collision cpu dos",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://openwall.com/lists/oss-security/2012/01/03/13"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "MaraDNS before 1.3.07.12 and 1.4.x before 1.4.08 computes hash values for DNS data without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted queries with the Recursion Desired (RD) bit set."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2012-01-08T00:00:00Z",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://samiam.org/blog/20111229.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=771428"
        },
        {
          "name": "[oss-security] 20120103 CVE request: maradns hash table collision cpu dos",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://openwall.com/lists/oss-security/2012/01/03/6"
        },
        {
          "name": "[oss-security] 20120103 Re: CVE request: maradns hash table collision cpu dos",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://openwall.com/lists/oss-security/2012/01/03/13"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert@redhat.com",
          "ID": "CVE-2012-0024",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "MaraDNS before 1.3.07.12 and 1.4.x before 1.4.08 computes hash values for DNS data without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted queries with the Recursion Desired (RD) bit set."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://samiam.org/blog/20111229.html",
              "refsource": "CONFIRM",
              "url": "http://samiam.org/blog/20111229.html"
            },
            {
              "name": "https://bugzilla.redhat.com/show_bug.cgi?id=771428",
              "refsource": "CONFIRM",
              "url": "https://bugzilla.redhat.com/show_bug.cgi?id=771428"
            },
            {
              "name": "[oss-security] 20120103 CVE request: maradns hash table collision cpu dos",
              "refsource": "MLIST",
              "url": "http://openwall.com/lists/oss-security/2012/01/03/6"
            },
            {
              "name": "[oss-security] 20120103 Re: CVE request: maradns hash table collision cpu dos",
              "refsource": "MLIST",
              "url": "http://openwall.com/lists/oss-security/2012/01/03/13"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2012-0024",
    "datePublished": "2012-01-08T00:00:00Z",
    "dateReserved": "2011-12-07T00:00:00Z",
    "dateUpdated": "2024-09-17T00:51:16.255Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2011-5055 (GCVE-0-2011-5055)

Vulnerability from cvelistv5 – Published: 2012-01-08 00:00 – Updated: 2024-09-16 19:15
VLAI?
Summary
MaraDNS 1.3.07.12 and 1.4.08 computes hash values for DNS data without properly restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted queries with the Recursion Desired (RD) bit set. NOTE: this issue exists because of an incomplete fix for CVE-2012-0024.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T00:23:40.031Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://samiam.org/blog/20111230.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=771428"
          },
          {
            "name": "[oss-security] 20120103 CVE request: maradns hash table collision cpu dos",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://openwall.com/lists/oss-security/2012/01/03/6"
          },
          {
            "name": "[oss-security] 20120103 Re: CVE request: maradns hash table collision cpu dos",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://openwall.com/lists/oss-security/2012/01/03/13"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "MaraDNS 1.3.07.12 and 1.4.08 computes hash values for DNS data without properly restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted queries with the Recursion Desired (RD) bit set.  NOTE: this issue exists because of an incomplete fix for CVE-2012-0024."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2012-01-08T00:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://samiam.org/blog/20111230.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=771428"
        },
        {
          "name": "[oss-security] 20120103 CVE request: maradns hash table collision cpu dos",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://openwall.com/lists/oss-security/2012/01/03/6"
        },
        {
          "name": "[oss-security] 20120103 Re: CVE request: maradns hash table collision cpu dos",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://openwall.com/lists/oss-security/2012/01/03/13"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2011-5055",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "MaraDNS 1.3.07.12 and 1.4.08 computes hash values for DNS data without properly restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted queries with the Recursion Desired (RD) bit set.  NOTE: this issue exists because of an incomplete fix for CVE-2012-0024."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://samiam.org/blog/20111230.html",
              "refsource": "CONFIRM",
              "url": "http://samiam.org/blog/20111230.html"
            },
            {
              "name": "https://bugzilla.redhat.com/show_bug.cgi?id=771428",
              "refsource": "CONFIRM",
              "url": "https://bugzilla.redhat.com/show_bug.cgi?id=771428"
            },
            {
              "name": "[oss-security] 20120103 CVE request: maradns hash table collision cpu dos",
              "refsource": "MLIST",
              "url": "http://openwall.com/lists/oss-security/2012/01/03/6"
            },
            {
              "name": "[oss-security] 20120103 Re: CVE request: maradns hash table collision cpu dos",
              "refsource": "MLIST",
              "url": "http://openwall.com/lists/oss-security/2012/01/03/13"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2011-5055",
    "datePublished": "2012-01-08T00:00:00Z",
    "dateReserved": "2012-01-07T00:00:00Z",
    "dateUpdated": "2024-09-16T19:15:23.660Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2011-5056 (GCVE-0-2011-5056)

Vulnerability from cvelistv5 – Published: 2012-01-08 00:00 – Updated: 2024-08-07 00:23
VLAI?
Summary
The authoritative server in MaraDNS through 2.0.04 computes hash values for DNS data without restricting the ability to trigger hash collisions predictably, which might allow local users to cause a denial of service (CPU consumption) via crafted records in zone files, a different vulnerability than CVE-2012-0024.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T00:23:39.905Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "maradns-server-dos(72258)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72258"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://samiam.org/blog/20111229.html"
          },
          {
            "name": "1026820",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1026820"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2011-12-29T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The authoritative server in MaraDNS through 2.0.04 computes hash values for DNS data without restricting the ability to trigger hash collisions predictably, which might allow local users to cause a denial of service (CPU consumption) via crafted records in zone files, a different vulnerability than CVE-2012-0024."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-12-05T19:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "maradns-server-dos(72258)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72258"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://samiam.org/blog/20111229.html"
        },
        {
          "name": "1026820",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1026820"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2011-5056",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The authoritative server in MaraDNS through 2.0.04 computes hash values for DNS data without restricting the ability to trigger hash collisions predictably, which might allow local users to cause a denial of service (CPU consumption) via crafted records in zone files, a different vulnerability than CVE-2012-0024."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "maradns-server-dos(72258)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72258"
            },
            {
              "name": "http://samiam.org/blog/20111229.html",
              "refsource": "CONFIRM",
              "url": "http://samiam.org/blog/20111229.html"
            },
            {
              "name": "1026820",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1026820"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2011-5056",
    "datePublished": "2012-01-08T00:00:00",
    "dateReserved": "2012-01-07T00:00:00",
    "dateUpdated": "2024-08-07T00:23:39.905Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2011-0520 (GCVE-0-2011-0520)

Vulnerability from cvelistv5 – Published: 2011-01-28 15:00 – Updated: 2024-08-06 21:58
VLAI?
Summary
The compress_add_dlabel_points function in dns/Compress.c in MaraDNS 1.4.03, 1.4.05, and probably other versions allows remote attackers to cause a denial of service (segmentation fault) and possibly execute arbitrary code via a long DNS hostname with a large number of labels, which triggers a heap-based buffer overflow.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.vupen.com/english/advisories/2011/0699 vdb-entryx_refsource_VUPEN
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=610834 x_refsource_CONFIRM
http://www.openwall.com/lists/oss-security/2011/01/24/1 mailing-listx_refsource_MLIST
http://www.openwall.com/lists/oss-security/2011/01/24/6 mailing-listx_refsource_MLIST
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://www.debian.org/security/2011/dsa-2196 vendor-advisoryx_refsource_DEBIAN
http://secunia.com/advisories/43107 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/43027 third-party-advisoryx_refsource_SECUNIA
http://osvdb.org/70630 vdb-entryx_refsource_OSVDB
http://www.securityfocus.com/bid/45966 vdb-entryx_refsource_BID
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T21:58:25.928Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "ADV-2011-0699",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2011/0699"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=610834"
          },
          {
            "name": "[oss-security] 20110123 CVE request: MaraDNS DoS via long queries",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2011/01/24/1"
          },
          {
            "name": "[oss-security] 20110124 Re: CVE request: MaraDNS DoS via long queries",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2011/01/24/6"
          },
          {
            "name": "maradns-compressadddlabelpoints-bo(64885)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64885"
          },
          {
            "name": "DSA-2196",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2011/dsa-2196"
          },
          {
            "name": "43107",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/43107"
          },
          {
            "name": "43027",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/43027"
          },
          {
            "name": "70630",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/70630"
          },
          {
            "name": "45966",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/45966"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2011-01-23T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The compress_add_dlabel_points function in dns/Compress.c in MaraDNS 1.4.03, 1.4.05, and probably other versions allows remote attackers to cause a denial of service (segmentation fault) and possibly execute arbitrary code via a long DNS hostname with a large number of labels, which triggers a heap-based buffer overflow."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-16T14:57:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "ADV-2011-0699",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2011/0699"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=610834"
        },
        {
          "name": "[oss-security] 20110123 CVE request: MaraDNS DoS via long queries",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2011/01/24/1"
        },
        {
          "name": "[oss-security] 20110124 Re: CVE request: MaraDNS DoS via long queries",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2011/01/24/6"
        },
        {
          "name": "maradns-compressadddlabelpoints-bo(64885)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64885"
        },
        {
          "name": "DSA-2196",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2011/dsa-2196"
        },
        {
          "name": "43107",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/43107"
        },
        {
          "name": "43027",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/43027"
        },
        {
          "name": "70630",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/70630"
        },
        {
          "name": "45966",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/45966"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert@redhat.com",
          "ID": "CVE-2011-0520",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The compress_add_dlabel_points function in dns/Compress.c in MaraDNS 1.4.03, 1.4.05, and probably other versions allows remote attackers to cause a denial of service (segmentation fault) and possibly execute arbitrary code via a long DNS hostname with a large number of labels, which triggers a heap-based buffer overflow."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "ADV-2011-0699",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2011/0699"
            },
            {
              "name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=610834",
              "refsource": "CONFIRM",
              "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=610834"
            },
            {
              "name": "[oss-security] 20110123 CVE request: MaraDNS DoS via long queries",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2011/01/24/1"
            },
            {
              "name": "[oss-security] 20110124 Re: CVE request: MaraDNS DoS via long queries",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2011/01/24/6"
            },
            {
              "name": "maradns-compressadddlabelpoints-bo(64885)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64885"
            },
            {
              "name": "DSA-2196",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2011/dsa-2196"
            },
            {
              "name": "43107",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/43107"
            },
            {
              "name": "43027",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/43027"
            },
            {
              "name": "70630",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/70630"
            },
            {
              "name": "45966",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/45966"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2011-0520",
    "datePublished": "2011-01-28T15:00:00",
    "dateReserved": "2011-01-20T00:00:00",
    "dateUpdated": "2024-08-06T21:58:25.928Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2010-2444 (GCVE-0-2010-2444)

Vulnerability from cvelistv5 – Published: 2010-06-25 18:00 – Updated: 2024-09-17 04:23
VLAI?
Summary
parse/Csv2_parse.c in MaraDNS 1.3.03, and other versions before 1.4.03, does not properly handle hostnames that do not end in a "." (dot) character, which allows remote attackers to cause a denial of service (NULL pointer dereference) via a crafted csv2 zone file.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T02:32:16.600Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "[oss-security] 20100624 Re: CVE requests: maradns, freeciv, rbot, gitolite, gource, shib, kvirc",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2010/06/24/5"
          },
          {
            "name": "[oss-security] 20100610 CVE requests: maradns, freeciv, rbot, gitolite, gource, shib, kvirc",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2010/06/09/4"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://maradns.org/download/maradns-1.4.02-parse_segfault.patch"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "parse/Csv2_parse.c in MaraDNS 1.3.03, and other versions before 1.4.03, does not properly handle hostnames that do not end in a \".\" (dot) character, which allows remote attackers to cause a denial of service (NULL pointer dereference) via a crafted csv2 zone file."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2010-06-25T18:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "[oss-security] 20100624 Re: CVE requests: maradns, freeciv, rbot, gitolite, gource, shib, kvirc",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2010/06/24/5"
        },
        {
          "name": "[oss-security] 20100610 CVE requests: maradns, freeciv, rbot, gitolite, gource, shib, kvirc",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2010/06/09/4"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://maradns.org/download/maradns-1.4.02-parse_segfault.patch"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2010-2444",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "parse/Csv2_parse.c in MaraDNS 1.3.03, and other versions before 1.4.03, does not properly handle hostnames that do not end in a \".\" (dot) character, which allows remote attackers to cause a denial of service (NULL pointer dereference) via a crafted csv2 zone file."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "[oss-security] 20100624 Re: CVE requests: maradns, freeciv, rbot, gitolite, gource, shib, kvirc",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2010/06/24/5"
            },
            {
              "name": "[oss-security] 20100610 CVE requests: maradns, freeciv, rbot, gitolite, gource, shib, kvirc",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2010/06/09/4"
            },
            {
              "name": "http://maradns.org/download/maradns-1.4.02-parse_segfault.patch",
              "refsource": "CONFIRM",
              "url": "http://maradns.org/download/maradns-1.4.02-parse_segfault.patch"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2010-2444",
    "datePublished": "2010-06-25T18:00:00Z",
    "dateReserved": "2010-06-24T00:00:00Z",
    "dateUpdated": "2024-09-17T04:23:48.391Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2008-0061 (GCVE-0-2008-0061)

Vulnerability from cvelistv5 – Published: 2008-01-03 22:00 – Updated: 2024-08-07 07:32
VLAI?
Summary
MaraDNS 1.0 before 1.0.41, 1.2 before 1.2.12.08, and 1.3 before 1.3.07.04 allows remote attackers to cause a denial of service via a crafted DNS packet that prevents an authoritative name (CNAME) record from resolving, aka "improper rotation of resource records."
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.vupen.com/english/advisories/2008/0026 vdb-entryx_refsource_VUPEN
http://secunia.com/advisories/28334 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/28329 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/28650 third-party-advisoryx_refsource_SECUNIA
http://security.gentoo.org/glsa/glsa-200801-16.xml vendor-advisoryx_refsource_GENTOO
http://bugs.gentoo.org/show_bug.cgi?id=204351 x_refsource_CONFIRM
http://www.debian.org/security/2008/dsa-1445 vendor-advisoryx_refsource_DEBIAN
http://maradns.blogspot.com/2007/08/maradns-updat… x_refsource_CONFIRM
http://www.maradns.org/changelog.html x_refsource_CONFIRM
http://www.securityfocus.com/bid/27124 vdb-entryx_refsource_BID
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T07:32:23.897Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "ADV-2008-0026",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2008/0026"
          },
          {
            "name": "28334",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/28334"
          },
          {
            "name": "28329",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/28329"
          },
          {
            "name": "28650",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/28650"
          },
          {
            "name": "GLSA-200801-16",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-200801-16.xml"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://bugs.gentoo.org/show_bug.cgi?id=204351"
          },
          {
            "name": "DSA-1445",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2008/dsa-1445"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://maradns.blogspot.com/2007/08/maradns-update-all-versions.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.maradns.org/changelog.html"
          },
          {
            "name": "27124",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/27124"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2007-08-29T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "MaraDNS 1.0 before 1.0.41, 1.2 before 1.2.12.08, and 1.3 before 1.3.07.04 allows remote attackers to cause a denial of service via a crafted DNS packet that prevents an authoritative name (CNAME) record from resolving, aka \"improper rotation of resource records.\""
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2008-01-09T10:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "ADV-2008-0026",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2008/0026"
        },
        {
          "name": "28334",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/28334"
        },
        {
          "name": "28329",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/28329"
        },
        {
          "name": "28650",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/28650"
        },
        {
          "name": "GLSA-200801-16",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://security.gentoo.org/glsa/glsa-200801-16.xml"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://bugs.gentoo.org/show_bug.cgi?id=204351"
        },
        {
          "name": "DSA-1445",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2008/dsa-1445"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://maradns.blogspot.com/2007/08/maradns-update-all-versions.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.maradns.org/changelog.html"
        },
        {
          "name": "27124",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/27124"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2008-0061",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "MaraDNS 1.0 before 1.0.41, 1.2 before 1.2.12.08, and 1.3 before 1.3.07.04 allows remote attackers to cause a denial of service via a crafted DNS packet that prevents an authoritative name (CNAME) record from resolving, aka \"improper rotation of resource records.\""
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "ADV-2008-0026",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2008/0026"
            },
            {
              "name": "28334",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/28334"
            },
            {
              "name": "28329",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/28329"
            },
            {
              "name": "28650",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/28650"
            },
            {
              "name": "GLSA-200801-16",
              "refsource": "GENTOO",
              "url": "http://security.gentoo.org/glsa/glsa-200801-16.xml"
            },
            {
              "name": "http://bugs.gentoo.org/show_bug.cgi?id=204351",
              "refsource": "CONFIRM",
              "url": "http://bugs.gentoo.org/show_bug.cgi?id=204351"
            },
            {
              "name": "DSA-1445",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2008/dsa-1445"
            },
            {
              "name": "http://maradns.blogspot.com/2007/08/maradns-update-all-versions.html",
              "refsource": "CONFIRM",
              "url": "http://maradns.blogspot.com/2007/08/maradns-update-all-versions.html"
            },
            {
              "name": "http://www.maradns.org/changelog.html",
              "refsource": "CONFIRM",
              "url": "http://www.maradns.org/changelog.html"
            },
            {
              "name": "27124",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/27124"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2008-0061",
    "datePublished": "2008-01-03T22:00:00",
    "dateReserved": "2008-01-03T00:00:00",
    "dateUpdated": "2024-08-07T07:32:23.897Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-31137 (GCVE-0-2023-31137)

Vulnerability from nvd – Published: 2023-05-09 13:56 – Updated: 2025-02-13 16:49
VLAI?
Summary
MaraDNS is open-source software that implements the Domain Name System (DNS). In version 3.5.0024 and prior, a remotely exploitable integer underflow vulnerability in the DNS packet decompression function allows an attacker to cause a Denial of Service by triggering an abnormal program termination. The vulnerability exists in the `decomp_get_rddata` function within the `Decompress.c` file. When handling a DNS packet with an Answer RR of qtype 16 (TXT record) and any qclass, if the `rdlength` is smaller than `rdata`, the result of the line `Decompress.c:886` is a negative number `len = rdlength - total;`. This value is then passed to the `decomp_append_bytes` function without proper validation, causing the program to attempt to allocate a massive chunk of memory that is impossible to allocate. Consequently, the program exits with an error code of 64, causing a Denial of Service. One proposed fix for this vulnerability is to patch `Decompress.c:887` by breaking `if(len <= 0)`, which has been incorporated in version 3.5.0036 via commit bab062bde40b2ae8a91eecd522e84d8b993bab58.
CWE
  • CWE-191 - Integer Underflow (Wrap or Wraparound)
Assigner
Impacted products
Vendor Product Version
samboy MaraDNS Affected: <= 3.5.0024
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T14:45:25.771Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "https://github.com/samboy/MaraDNS/security/advisories/GHSA-58m7-826v-9c3c",
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://github.com/samboy/MaraDNS/security/advisories/GHSA-58m7-826v-9c3c"
          },
          {
            "name": "https://github.com/samboy/MaraDNS/commit/bab062bde40b2ae8a91eecd522e84d8b993bab58",
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://github.com/samboy/MaraDNS/commit/bab062bde40b2ae8a91eecd522e84d8b993bab58"
          },
          {
            "name": "https://github.com/samboy/MaraDNS/blob/08b21ea20d80cedcb74aa8f14979ec7c61846663/dns/Decompress.c#L886",
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://github.com/samboy/MaraDNS/blob/08b21ea20d80cedcb74aa8f14979ec7c61846663/dns/Decompress.c#L886"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NB7LDZM5AGWC5BHHQHW6CP5OFNBBKFOQ/"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3VSMLJX25MXGQ6A7UPOGK7VPUVDESPHL/"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2023/06/msg00019.html"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.debian.org/security/2023/dsa-5441"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-31137",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-03-08T16:26:06.644708Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-11-27T16:19:59.296Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "MaraDNS",
          "vendor": "samboy",
          "versions": [
            {
              "status": "affected",
              "version": "\u003c= 3.5.0024"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "MaraDNS is open-source software that implements the Domain Name System (DNS). In version 3.5.0024 and prior, a remotely exploitable integer underflow vulnerability in the DNS packet decompression function allows an attacker to cause a Denial of Service by triggering an abnormal program termination.\n\nThe vulnerability exists in the `decomp_get_rddata` function within the `Decompress.c` file. When handling a DNS packet with an Answer RR of qtype 16 (TXT record) and any qclass, if the `rdlength` is smaller than `rdata`, the result of the line `Decompress.c:886` is a negative number `len = rdlength - total;`. This value is then passed to the `decomp_append_bytes` function without proper validation, causing the program to attempt to allocate a massive chunk of memory that is impossible to allocate. Consequently, the program exits with an error code of 64, causing a Denial of Service.\n\nOne proposed fix for this vulnerability is to patch `Decompress.c:887` by breaking `if(len \u003c= 0)`, which has been incorporated in version 3.5.0036 via commit bab062bde40b2ae8a91eecd522e84d8b993bab58."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-191",
              "description": "CWE-191: Integer Underflow (Wrap or Wraparound)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-06-29T11:06:15.332Z",
        "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
        "shortName": "GitHub_M"
      },
      "references": [
        {
          "name": "https://github.com/samboy/MaraDNS/security/advisories/GHSA-58m7-826v-9c3c",
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://github.com/samboy/MaraDNS/security/advisories/GHSA-58m7-826v-9c3c"
        },
        {
          "name": "https://github.com/samboy/MaraDNS/commit/bab062bde40b2ae8a91eecd522e84d8b993bab58",
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/samboy/MaraDNS/commit/bab062bde40b2ae8a91eecd522e84d8b993bab58"
        },
        {
          "name": "https://github.com/samboy/MaraDNS/blob/08b21ea20d80cedcb74aa8f14979ec7c61846663/dns/Decompress.c#L886",
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/samboy/MaraDNS/blob/08b21ea20d80cedcb74aa8f14979ec7c61846663/dns/Decompress.c#L886"
        },
        {
          "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NB7LDZM5AGWC5BHHQHW6CP5OFNBBKFOQ/"
        },
        {
          "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3VSMLJX25MXGQ6A7UPOGK7VPUVDESPHL/"
        },
        {
          "url": "https://lists.debian.org/debian-lts-announce/2023/06/msg00019.html"
        },
        {
          "url": "https://www.debian.org/security/2023/dsa-5441"
        }
      ],
      "source": {
        "advisory": "GHSA-58m7-826v-9c3c",
        "discovery": "UNKNOWN"
      },
      "title": "MaraDNS Integer Underflow Vulnerability in DNS Packet Decompression"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
    "assignerShortName": "GitHub_M",
    "cveId": "CVE-2023-31137",
    "datePublished": "2023-05-09T13:56:46.219Z",
    "dateReserved": "2023-04-24T21:44:10.417Z",
    "dateUpdated": "2025-02-13T16:49:46.296Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2022-30256 (GCVE-0-2022-30256)

Vulnerability from nvd – Published: 2022-11-18 00:00 – Updated: 2025-04-29 14:40
VLAI?
Summary
An issue was discovered in MaraDNS Deadwood through 3.5.0021 that allows variant V1 of unintended domain name resolution. A revoked domain name can still be resolvable for a long time, including expired domains and taken-down malicious domains. The effects of an exploit would be widespread and highly impactful, because the exploitation conforms to de facto DNS specifications and operational practices, and overcomes current mitigation patches for "Ghost" domain names.
CWE
  • n/a
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T06:40:47.864Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://maradns.samiam.org/"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://maradns.samiam.org/security.html#CVE-2022-30256"
          },
          {
            "name": "FEDORA-2023-0c012f6245",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NB7LDZM5AGWC5BHHQHW6CP5OFNBBKFOQ/"
          },
          {
            "name": "FEDORA-2023-cdce244fb8",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3VSMLJX25MXGQ6A7UPOGK7VPUVDESPHL/"
          },
          {
            "name": "[debian-lts-announce] 20230619 [SECURITY] [DLA 3457-1] maradns security update",
            "tags": [
              "mailing-list",
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2023/06/msg00019.html"
          },
          {
            "name": "DSA-5441",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://www.debian.org/security/2023/dsa-5441"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "NETWORK",
              "availabilityImpact": "NONE",
              "baseScore": 7.5,
              "baseSeverity": "HIGH",
              "confidentialityImpact": "NONE",
              "integrityImpact": "HIGH",
              "privilegesRequired": "NONE",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2022-30256",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-04-29T14:39:40.634132Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-672",
                "description": "CWE-672 Operation on a Resource after Expiration or Release",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-04-29T14:40:33.438Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "An issue was discovered in MaraDNS Deadwood through 3.5.0021 that allows variant V1 of unintended domain name resolution. A revoked domain name can still be resolvable for a long time, including expired domains and taken-down malicious domains. The effects of an exploit would be widespread and highly impactful, because the exploitation conforms to de facto DNS specifications and operational practices, and overcomes current mitigation patches for \"Ghost\" domain names."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-06-29T00:00:00.000Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "url": "https://maradns.samiam.org/"
        },
        {
          "url": "https://maradns.samiam.org/security.html#CVE-2022-30256"
        },
        {
          "name": "FEDORA-2023-0c012f6245",
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NB7LDZM5AGWC5BHHQHW6CP5OFNBBKFOQ/"
        },
        {
          "name": "FEDORA-2023-cdce244fb8",
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3VSMLJX25MXGQ6A7UPOGK7VPUVDESPHL/"
        },
        {
          "name": "[debian-lts-announce] 20230619 [SECURITY] [DLA 3457-1] maradns security update",
          "tags": [
            "mailing-list"
          ],
          "url": "https://lists.debian.org/debian-lts-announce/2023/06/msg00019.html"
        },
        {
          "name": "DSA-5441",
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://www.debian.org/security/2023/dsa-5441"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2022-30256",
    "datePublished": "2022-11-18T00:00:00.000Z",
    "dateReserved": "2022-05-04T00:00:00.000Z",
    "dateUpdated": "2025-04-29T14:40:33.438Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2012-1570 (GCVE-0-2012-1570)

Vulnerability from nvd – Published: 2012-03-28 10:00 – Updated: 2024-08-06 19:01
VLAI?
Summary
The resolver in MaraDNS before 1.3.0.7.15 and 1.4.x before 1.4.12 overwrites cached server names and TTL values in NS records during the processing of a response to an A record query, which allows remote attackers to trigger continued resolvability of revoked domain names via a "ghost domain names" attack.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.openwall.com/lists/oss-security/2012/0… mailing-listx_refsource_MLIST
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://www.openwall.com/lists/oss-security/2012/03/20/1 mailing-listx_refsource_MLIST
http://secunia.com/advisories/48492 third-party-advisoryx_refsource_SECUNIA
https://bugzilla.redhat.com/show_bug.cgi?id=804770 x_refsource_CONFIRM
http://osvdb.org/80192 vdb-entryx_refsource_OSVDB
http://www.securitytracker.com/id?1026821 vdb-entryx_refsource_SECTRACK
http://www.maradns.org/changelog.html x_refsource_CONFIRM
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T19:01:02.621Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "[oss-security] 20120320 Re: CVE request: maradns deleted domain record cache persistance flaw",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2012/03/20/10"
          },
          {
            "name": "maradns-domain-spoofing(74119)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74119"
          },
          {
            "name": "[oss-security] 20120319 CVE request: maradns deleted domain record cache persistance flaw",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2012/03/20/1"
          },
          {
            "name": "48492",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/48492"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=804770"
          },
          {
            "name": "80192",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/80192"
          },
          {
            "name": "1026821",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1026821"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.maradns.org/changelog.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2012-03-19T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The resolver in MaraDNS before 1.3.0.7.15 and 1.4.x before 1.4.12 overwrites cached server names and TTL values in NS records during the processing of a response to an A record query, which allows remote attackers to trigger continued resolvability of revoked domain names via a \"ghost domain names\" attack."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-12-12T19:57:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "[oss-security] 20120320 Re: CVE request: maradns deleted domain record cache persistance flaw",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2012/03/20/10"
        },
        {
          "name": "maradns-domain-spoofing(74119)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74119"
        },
        {
          "name": "[oss-security] 20120319 CVE request: maradns deleted domain record cache persistance flaw",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2012/03/20/1"
        },
        {
          "name": "48492",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/48492"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=804770"
        },
        {
          "name": "80192",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/80192"
        },
        {
          "name": "1026821",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1026821"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.maradns.org/changelog.html"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2012-1570",
    "datePublished": "2012-03-28T10:00:00",
    "dateReserved": "2012-03-12T00:00:00",
    "dateUpdated": "2024-08-06T19:01:02.621Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2012-0024 (GCVE-0-2012-0024)

Vulnerability from nvd – Published: 2012-01-08 00:00 – Updated: 2024-09-17 00:51
VLAI?
Summary
MaraDNS before 1.3.07.12 and 1.4.x before 1.4.08 computes hash values for DNS data without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted queries with the Recursion Desired (RD) bit set.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T18:09:17.254Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://samiam.org/blog/20111229.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=771428"
          },
          {
            "name": "[oss-security] 20120103 CVE request: maradns hash table collision cpu dos",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://openwall.com/lists/oss-security/2012/01/03/6"
          },
          {
            "name": "[oss-security] 20120103 Re: CVE request: maradns hash table collision cpu dos",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://openwall.com/lists/oss-security/2012/01/03/13"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "MaraDNS before 1.3.07.12 and 1.4.x before 1.4.08 computes hash values for DNS data without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted queries with the Recursion Desired (RD) bit set."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2012-01-08T00:00:00Z",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://samiam.org/blog/20111229.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=771428"
        },
        {
          "name": "[oss-security] 20120103 CVE request: maradns hash table collision cpu dos",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://openwall.com/lists/oss-security/2012/01/03/6"
        },
        {
          "name": "[oss-security] 20120103 Re: CVE request: maradns hash table collision cpu dos",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://openwall.com/lists/oss-security/2012/01/03/13"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert@redhat.com",
          "ID": "CVE-2012-0024",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "MaraDNS before 1.3.07.12 and 1.4.x before 1.4.08 computes hash values for DNS data without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted queries with the Recursion Desired (RD) bit set."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://samiam.org/blog/20111229.html",
              "refsource": "CONFIRM",
              "url": "http://samiam.org/blog/20111229.html"
            },
            {
              "name": "https://bugzilla.redhat.com/show_bug.cgi?id=771428",
              "refsource": "CONFIRM",
              "url": "https://bugzilla.redhat.com/show_bug.cgi?id=771428"
            },
            {
              "name": "[oss-security] 20120103 CVE request: maradns hash table collision cpu dos",
              "refsource": "MLIST",
              "url": "http://openwall.com/lists/oss-security/2012/01/03/6"
            },
            {
              "name": "[oss-security] 20120103 Re: CVE request: maradns hash table collision cpu dos",
              "refsource": "MLIST",
              "url": "http://openwall.com/lists/oss-security/2012/01/03/13"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2012-0024",
    "datePublished": "2012-01-08T00:00:00Z",
    "dateReserved": "2011-12-07T00:00:00Z",
    "dateUpdated": "2024-09-17T00:51:16.255Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2011-5055 (GCVE-0-2011-5055)

Vulnerability from nvd – Published: 2012-01-08 00:00 – Updated: 2024-09-16 19:15
VLAI?
Summary
MaraDNS 1.3.07.12 and 1.4.08 computes hash values for DNS data without properly restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted queries with the Recursion Desired (RD) bit set. NOTE: this issue exists because of an incomplete fix for CVE-2012-0024.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T00:23:40.031Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://samiam.org/blog/20111230.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=771428"
          },
          {
            "name": "[oss-security] 20120103 CVE request: maradns hash table collision cpu dos",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://openwall.com/lists/oss-security/2012/01/03/6"
          },
          {
            "name": "[oss-security] 20120103 Re: CVE request: maradns hash table collision cpu dos",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://openwall.com/lists/oss-security/2012/01/03/13"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "MaraDNS 1.3.07.12 and 1.4.08 computes hash values for DNS data without properly restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted queries with the Recursion Desired (RD) bit set.  NOTE: this issue exists because of an incomplete fix for CVE-2012-0024."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2012-01-08T00:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://samiam.org/blog/20111230.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=771428"
        },
        {
          "name": "[oss-security] 20120103 CVE request: maradns hash table collision cpu dos",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://openwall.com/lists/oss-security/2012/01/03/6"
        },
        {
          "name": "[oss-security] 20120103 Re: CVE request: maradns hash table collision cpu dos",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://openwall.com/lists/oss-security/2012/01/03/13"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2011-5055",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "MaraDNS 1.3.07.12 and 1.4.08 computes hash values for DNS data without properly restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted queries with the Recursion Desired (RD) bit set.  NOTE: this issue exists because of an incomplete fix for CVE-2012-0024."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://samiam.org/blog/20111230.html",
              "refsource": "CONFIRM",
              "url": "http://samiam.org/blog/20111230.html"
            },
            {
              "name": "https://bugzilla.redhat.com/show_bug.cgi?id=771428",
              "refsource": "CONFIRM",
              "url": "https://bugzilla.redhat.com/show_bug.cgi?id=771428"
            },
            {
              "name": "[oss-security] 20120103 CVE request: maradns hash table collision cpu dos",
              "refsource": "MLIST",
              "url": "http://openwall.com/lists/oss-security/2012/01/03/6"
            },
            {
              "name": "[oss-security] 20120103 Re: CVE request: maradns hash table collision cpu dos",
              "refsource": "MLIST",
              "url": "http://openwall.com/lists/oss-security/2012/01/03/13"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2011-5055",
    "datePublished": "2012-01-08T00:00:00Z",
    "dateReserved": "2012-01-07T00:00:00Z",
    "dateUpdated": "2024-09-16T19:15:23.660Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2011-5056 (GCVE-0-2011-5056)

Vulnerability from nvd – Published: 2012-01-08 00:00 – Updated: 2024-08-07 00:23
VLAI?
Summary
The authoritative server in MaraDNS through 2.0.04 computes hash values for DNS data without restricting the ability to trigger hash collisions predictably, which might allow local users to cause a denial of service (CPU consumption) via crafted records in zone files, a different vulnerability than CVE-2012-0024.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T00:23:39.905Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "maradns-server-dos(72258)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72258"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://samiam.org/blog/20111229.html"
          },
          {
            "name": "1026820",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1026820"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2011-12-29T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The authoritative server in MaraDNS through 2.0.04 computes hash values for DNS data without restricting the ability to trigger hash collisions predictably, which might allow local users to cause a denial of service (CPU consumption) via crafted records in zone files, a different vulnerability than CVE-2012-0024."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-12-05T19:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "maradns-server-dos(72258)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72258"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://samiam.org/blog/20111229.html"
        },
        {
          "name": "1026820",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1026820"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2011-5056",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The authoritative server in MaraDNS through 2.0.04 computes hash values for DNS data without restricting the ability to trigger hash collisions predictably, which might allow local users to cause a denial of service (CPU consumption) via crafted records in zone files, a different vulnerability than CVE-2012-0024."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "maradns-server-dos(72258)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72258"
            },
            {
              "name": "http://samiam.org/blog/20111229.html",
              "refsource": "CONFIRM",
              "url": "http://samiam.org/blog/20111229.html"
            },
            {
              "name": "1026820",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1026820"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2011-5056",
    "datePublished": "2012-01-08T00:00:00",
    "dateReserved": "2012-01-07T00:00:00",
    "dateUpdated": "2024-08-07T00:23:39.905Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2011-0520 (GCVE-0-2011-0520)

Vulnerability from nvd – Published: 2011-01-28 15:00 – Updated: 2024-08-06 21:58
VLAI?
Summary
The compress_add_dlabel_points function in dns/Compress.c in MaraDNS 1.4.03, 1.4.05, and probably other versions allows remote attackers to cause a denial of service (segmentation fault) and possibly execute arbitrary code via a long DNS hostname with a large number of labels, which triggers a heap-based buffer overflow.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.vupen.com/english/advisories/2011/0699 vdb-entryx_refsource_VUPEN
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=610834 x_refsource_CONFIRM
http://www.openwall.com/lists/oss-security/2011/01/24/1 mailing-listx_refsource_MLIST
http://www.openwall.com/lists/oss-security/2011/01/24/6 mailing-listx_refsource_MLIST
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://www.debian.org/security/2011/dsa-2196 vendor-advisoryx_refsource_DEBIAN
http://secunia.com/advisories/43107 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/43027 third-party-advisoryx_refsource_SECUNIA
http://osvdb.org/70630 vdb-entryx_refsource_OSVDB
http://www.securityfocus.com/bid/45966 vdb-entryx_refsource_BID
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T21:58:25.928Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "ADV-2011-0699",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2011/0699"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=610834"
          },
          {
            "name": "[oss-security] 20110123 CVE request: MaraDNS DoS via long queries",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2011/01/24/1"
          },
          {
            "name": "[oss-security] 20110124 Re: CVE request: MaraDNS DoS via long queries",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2011/01/24/6"
          },
          {
            "name": "maradns-compressadddlabelpoints-bo(64885)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64885"
          },
          {
            "name": "DSA-2196",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2011/dsa-2196"
          },
          {
            "name": "43107",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/43107"
          },
          {
            "name": "43027",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/43027"
          },
          {
            "name": "70630",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/70630"
          },
          {
            "name": "45966",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/45966"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2011-01-23T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The compress_add_dlabel_points function in dns/Compress.c in MaraDNS 1.4.03, 1.4.05, and probably other versions allows remote attackers to cause a denial of service (segmentation fault) and possibly execute arbitrary code via a long DNS hostname with a large number of labels, which triggers a heap-based buffer overflow."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-16T14:57:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "ADV-2011-0699",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2011/0699"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=610834"
        },
        {
          "name": "[oss-security] 20110123 CVE request: MaraDNS DoS via long queries",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2011/01/24/1"
        },
        {
          "name": "[oss-security] 20110124 Re: CVE request: MaraDNS DoS via long queries",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2011/01/24/6"
        },
        {
          "name": "maradns-compressadddlabelpoints-bo(64885)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64885"
        },
        {
          "name": "DSA-2196",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2011/dsa-2196"
        },
        {
          "name": "43107",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/43107"
        },
        {
          "name": "43027",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/43027"
        },
        {
          "name": "70630",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/70630"
        },
        {
          "name": "45966",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/45966"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert@redhat.com",
          "ID": "CVE-2011-0520",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The compress_add_dlabel_points function in dns/Compress.c in MaraDNS 1.4.03, 1.4.05, and probably other versions allows remote attackers to cause a denial of service (segmentation fault) and possibly execute arbitrary code via a long DNS hostname with a large number of labels, which triggers a heap-based buffer overflow."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "ADV-2011-0699",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2011/0699"
            },
            {
              "name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=610834",
              "refsource": "CONFIRM",
              "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=610834"
            },
            {
              "name": "[oss-security] 20110123 CVE request: MaraDNS DoS via long queries",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2011/01/24/1"
            },
            {
              "name": "[oss-security] 20110124 Re: CVE request: MaraDNS DoS via long queries",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2011/01/24/6"
            },
            {
              "name": "maradns-compressadddlabelpoints-bo(64885)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64885"
            },
            {
              "name": "DSA-2196",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2011/dsa-2196"
            },
            {
              "name": "43107",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/43107"
            },
            {
              "name": "43027",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/43027"
            },
            {
              "name": "70630",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/70630"
            },
            {
              "name": "45966",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/45966"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2011-0520",
    "datePublished": "2011-01-28T15:00:00",
    "dateReserved": "2011-01-20T00:00:00",
    "dateUpdated": "2024-08-06T21:58:25.928Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2010-2444 (GCVE-0-2010-2444)

Vulnerability from nvd – Published: 2010-06-25 18:00 – Updated: 2024-09-17 04:23
VLAI?
Summary
parse/Csv2_parse.c in MaraDNS 1.3.03, and other versions before 1.4.03, does not properly handle hostnames that do not end in a "." (dot) character, which allows remote attackers to cause a denial of service (NULL pointer dereference) via a crafted csv2 zone file.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T02:32:16.600Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "[oss-security] 20100624 Re: CVE requests: maradns, freeciv, rbot, gitolite, gource, shib, kvirc",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2010/06/24/5"
          },
          {
            "name": "[oss-security] 20100610 CVE requests: maradns, freeciv, rbot, gitolite, gource, shib, kvirc",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2010/06/09/4"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://maradns.org/download/maradns-1.4.02-parse_segfault.patch"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "parse/Csv2_parse.c in MaraDNS 1.3.03, and other versions before 1.4.03, does not properly handle hostnames that do not end in a \".\" (dot) character, which allows remote attackers to cause a denial of service (NULL pointer dereference) via a crafted csv2 zone file."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2010-06-25T18:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "[oss-security] 20100624 Re: CVE requests: maradns, freeciv, rbot, gitolite, gource, shib, kvirc",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2010/06/24/5"
        },
        {
          "name": "[oss-security] 20100610 CVE requests: maradns, freeciv, rbot, gitolite, gource, shib, kvirc",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2010/06/09/4"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://maradns.org/download/maradns-1.4.02-parse_segfault.patch"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2010-2444",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "parse/Csv2_parse.c in MaraDNS 1.3.03, and other versions before 1.4.03, does not properly handle hostnames that do not end in a \".\" (dot) character, which allows remote attackers to cause a denial of service (NULL pointer dereference) via a crafted csv2 zone file."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "[oss-security] 20100624 Re: CVE requests: maradns, freeciv, rbot, gitolite, gource, shib, kvirc",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2010/06/24/5"
            },
            {
              "name": "[oss-security] 20100610 CVE requests: maradns, freeciv, rbot, gitolite, gource, shib, kvirc",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2010/06/09/4"
            },
            {
              "name": "http://maradns.org/download/maradns-1.4.02-parse_segfault.patch",
              "refsource": "CONFIRM",
              "url": "http://maradns.org/download/maradns-1.4.02-parse_segfault.patch"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2010-2444",
    "datePublished": "2010-06-25T18:00:00Z",
    "dateReserved": "2010-06-24T00:00:00Z",
    "dateUpdated": "2024-09-17T04:23:48.391Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2008-0061 (GCVE-0-2008-0061)

Vulnerability from nvd – Published: 2008-01-03 22:00 – Updated: 2024-08-07 07:32
VLAI?
Summary
MaraDNS 1.0 before 1.0.41, 1.2 before 1.2.12.08, and 1.3 before 1.3.07.04 allows remote attackers to cause a denial of service via a crafted DNS packet that prevents an authoritative name (CNAME) record from resolving, aka "improper rotation of resource records."
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.vupen.com/english/advisories/2008/0026 vdb-entryx_refsource_VUPEN
http://secunia.com/advisories/28334 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/28329 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/28650 third-party-advisoryx_refsource_SECUNIA
http://security.gentoo.org/glsa/glsa-200801-16.xml vendor-advisoryx_refsource_GENTOO
http://bugs.gentoo.org/show_bug.cgi?id=204351 x_refsource_CONFIRM
http://www.debian.org/security/2008/dsa-1445 vendor-advisoryx_refsource_DEBIAN
http://maradns.blogspot.com/2007/08/maradns-updat… x_refsource_CONFIRM
http://www.maradns.org/changelog.html x_refsource_CONFIRM
http://www.securityfocus.com/bid/27124 vdb-entryx_refsource_BID
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T07:32:23.897Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "ADV-2008-0026",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2008/0026"
          },
          {
            "name": "28334",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/28334"
          },
          {
            "name": "28329",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/28329"
          },
          {
            "name": "28650",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/28650"
          },
          {
            "name": "GLSA-200801-16",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-200801-16.xml"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://bugs.gentoo.org/show_bug.cgi?id=204351"
          },
          {
            "name": "DSA-1445",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2008/dsa-1445"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://maradns.blogspot.com/2007/08/maradns-update-all-versions.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.maradns.org/changelog.html"
          },
          {
            "name": "27124",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/27124"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2007-08-29T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "MaraDNS 1.0 before 1.0.41, 1.2 before 1.2.12.08, and 1.3 before 1.3.07.04 allows remote attackers to cause a denial of service via a crafted DNS packet that prevents an authoritative name (CNAME) record from resolving, aka \"improper rotation of resource records.\""
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2008-01-09T10:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "ADV-2008-0026",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2008/0026"
        },
        {
          "name": "28334",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/28334"
        },
        {
          "name": "28329",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/28329"
        },
        {
          "name": "28650",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/28650"
        },
        {
          "name": "GLSA-200801-16",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://security.gentoo.org/glsa/glsa-200801-16.xml"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://bugs.gentoo.org/show_bug.cgi?id=204351"
        },
        {
          "name": "DSA-1445",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2008/dsa-1445"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://maradns.blogspot.com/2007/08/maradns-update-all-versions.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.maradns.org/changelog.html"
        },
        {
          "name": "27124",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/27124"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2008-0061",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "MaraDNS 1.0 before 1.0.41, 1.2 before 1.2.12.08, and 1.3 before 1.3.07.04 allows remote attackers to cause a denial of service via a crafted DNS packet that prevents an authoritative name (CNAME) record from resolving, aka \"improper rotation of resource records.\""
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "ADV-2008-0026",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2008/0026"
            },
            {
              "name": "28334",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/28334"
            },
            {
              "name": "28329",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/28329"
            },
            {
              "name": "28650",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/28650"
            },
            {
              "name": "GLSA-200801-16",
              "refsource": "GENTOO",
              "url": "http://security.gentoo.org/glsa/glsa-200801-16.xml"
            },
            {
              "name": "http://bugs.gentoo.org/show_bug.cgi?id=204351",
              "refsource": "CONFIRM",
              "url": "http://bugs.gentoo.org/show_bug.cgi?id=204351"
            },
            {
              "name": "DSA-1445",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2008/dsa-1445"
            },
            {
              "name": "http://maradns.blogspot.com/2007/08/maradns-update-all-versions.html",
              "refsource": "CONFIRM",
              "url": "http://maradns.blogspot.com/2007/08/maradns-update-all-versions.html"
            },
            {
              "name": "http://www.maradns.org/changelog.html",
              "refsource": "CONFIRM",
              "url": "http://www.maradns.org/changelog.html"
            },
            {
              "name": "27124",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/27124"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2008-0061",
    "datePublished": "2008-01-03T22:00:00",
    "dateReserved": "2008-01-03T00:00:00",
    "dateUpdated": "2024-08-07T07:32:23.897Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}