All the vulnerabilites related to don_moore - mydns
Vulnerability from fkie_nvd
Published
2006-01-21 01:03
Modified
2024-11-21 00:06
Severity ?
Summary
Unspecified "critical denial-of-service vulnerability" in MyDNS before 1.1.0 has unknown impact and attack vectors.
References
cve@mitre.orghttp://mydns.bboy.net/download/changelog.html
cve@mitre.orghttp://secunia.com/advisories/18532Patch, Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/18641
cve@mitre.orghttp://secunia.com/advisories/18653
cve@mitre.orghttp://securitytracker.com/id?1015521
cve@mitre.orghttp://www.debian.org/security/2006/dsa-963
cve@mitre.orghttp://www.gentoo.org/security/en/glsa/glsa-200601-16.xml
cve@mitre.orghttp://www.osvdb.org/22636Patch
cve@mitre.orghttp://www.securityfocus.com/bid/16431
cve@mitre.orghttp://www.vupen.com/english/advisories/2006/0256
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/24228
af854a3a-2127-422b-91ae-364da2661108http://mydns.bboy.net/download/changelog.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18532Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18641
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18653
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1015521
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2006/dsa-963
af854a3a-2127-422b-91ae-364da2661108http://www.gentoo.org/security/en/glsa/glsa-200601-16.xml
af854a3a-2127-422b-91ae-364da2661108http://www.osvdb.org/22636Patch
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/16431
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2006/0256
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/24228
Impacted products



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:don_moore:mydns:0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC34DC23-117A-403E-9C87-79B1C512A5DA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:don_moore:mydns:0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "BFE559DF-3874-42E7-BB5B-8968E52D7A04",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:don_moore:mydns:0.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5359874-602B-4EB2-8F30-A9E3E418556E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:don_moore:mydns:0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "11068A01-20FB-4039-8919-85CF93F0FF2C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:don_moore:mydns:0.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B5B6A09-E166-4139-A592-76E1A9BB496A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:don_moore:mydns:0.8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0D64650-5955-4269-8D08-4B0CD410C9DC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:don_moore:mydns:0.8.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCBD3BDC-4BBD-45EE-9C63-5DB564FF2F9F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:don_moore:mydns:0.9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "BDA0BB14-D934-4308-8D3E-287BC08CCF5C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:don_moore:mydns:0.9.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "6881A5E3-253C-4668-9795-955A06A82049",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:don_moore:mydns:0.9.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EC1A4DE-B032-4A64-8154-DA56B52E7E2A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:don_moore:mydns:0.9.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F13CDFF-77C6-4C3C-9A41-5752577102B2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:don_moore:mydns:0.9.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "B49E1F37-6877-4F38-968B-46CD49FA3171",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:don_moore:mydns:0.9.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "6878C5C9-F0B7-4290-9EEB-8404BD77BFCB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:don_moore:mydns:0.9.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "7465EA92-7DEA-4CE9-89F0-A42B289816DF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:don_moore:mydns:0.9.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "68B7259A-EE66-4967-A8E7-978BD8DE1695",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:don_moore:mydns:0.9.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1505551-DE83-4ED4-8417-391397BA1475",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:don_moore:mydns:0.9.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "13C31DDD-02F6-4BFA-A5A4-DC8EAE4C2227",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:don_moore:mydns:0.9.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "5CAB367C-AF5F-4DA5-826D-A7A41ABB3F60",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:don_moore:mydns:0.9.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "22C37E6C-257F-488B-A107-B05164AE4543",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:don_moore:mydns:0.10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "D3B3D730-15C0-494A-A0B6-231C9F370A58",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:don_moore:mydns:0.10.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2A940A2-02E3-4F2F-9D91-A54C7FBD4531",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:don_moore:mydns:0.10.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "20F25AD9-E73C-4CC1-8572-7EB79641FFA4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:don_moore:mydns:0.10.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "34615890-E75D-40F9-A653-D2655CDF9057",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:don_moore:mydns:0.10.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "7201B3E5-3F6F-4BAF-9FB6-A5F1C81B894C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:don_moore:mydns:0.11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "53CDDF69-6514-46C9-ADC1-4ACAEF6093BE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:don_moore:mydns:1.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "3361EA61-9ACF-4836-8C44-C45EE29F9BF7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Unspecified \"critical denial-of-service vulnerability\" in MyDNS before 1.1.0 has unknown impact and attack vectors."
    }
  ],
  "id": "CVE-2006-0351",
  "lastModified": "2024-11-21T00:06:15.863",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2006-01-21T01:03:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://mydns.bboy.net/download/changelog.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/18532"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/18641"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/18653"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securitytracker.com/id?1015521"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2006/dsa-963"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.gentoo.org/security/en/glsa/glsa-200601-16.xml"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.osvdb.org/22636"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/16431"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2006/0256"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24228"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://mydns.bboy.net/download/changelog.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/18532"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/18641"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/18653"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1015521"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2006/dsa-963"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.gentoo.org/security/en/glsa/glsa-200601-16.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.osvdb.org/22636"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/16431"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2006/0256"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24228"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2006-04-27 22:03
Modified
2024-11-21 00:10
Severity ?
Summary
Unspecified vulnerability in MyDNS 1.1.0 allows remote attackers to cause a denial of service via a crafted DNS message, aka "Query-of-death," as demonstrated by the OUSPG PROTOS DNS test suite.
Impacted products
Vendor Product Version
don_moore mydns 1.1.0



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:don_moore:mydns:1.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "40833162-A29F-4596-8B3B-E09EE19FF68F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Unspecified vulnerability in MyDNS 1.1.0 allows remote attackers to cause a denial of service via a crafted DNS message, aka \"Query-of-death,\" as demonstrated by the OUSPG PROTOS DNS test suite."
    }
  ],
  "id": "CVE-2006-2075",
  "lastModified": "2024-11-21T00:10:29.960",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2006-04-27T22:03:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://securitytracker.com/id?1015990"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/955777"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.niscc.gov.uk/niscc/docs/br-20060425-00311.html?lang=en"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.niscc.gov.uk/niscc/docs/re-20060425-00312.pdf?lang=en"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2006/1505"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26081"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://securitytracker.com/id?1015990"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/955777"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.niscc.gov.uk/niscc/docs/br-20060425-00311.html?lang=en"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.niscc.gov.uk/niscc/docs/re-20060425-00312.pdf?lang=en"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2006/1505"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26081"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2007-04-30 22:19
Modified
2024-11-21 00:30
Severity ?
Summary
Multiple buffer overflows in MyDNS 1.1.0 allow remote attackers to (1) cause a denial of service (daemon crash) and possibly execute arbitrary code via a certain update, which triggers a heap-based buffer overflow in update.c; and (2) cause a denial of service (daemon crash) via unspecified vectors that trigger an off-by-one stack-based buffer overflow in update.c.
References
cve@mitre.orghttp://lists.grok.org.uk/pipermail/full-disclosure/2007-April/054024.html
cve@mitre.orghttp://osvdb.org/35438
cve@mitre.orghttp://osvdb.org/35439
cve@mitre.orghttp://secunia.com/advisories/25007Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/28086
cve@mitre.orghttp://securityreason.com/securityalert/2658
cve@mitre.orghttp://www.debian.org/security/2007/dsa-1434
cve@mitre.orghttp://www.digit-labs.org/files/exploits/mydns-rr-smash.cExploit
cve@mitre.orghttp://www.digit-labs.org/files/patches/mydns-update.c.diff
cve@mitre.orghttp://www.securityfocus.com/bid/23694
cve@mitre.orghttp://www.vupen.com/english/advisories/2007/1561
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/33933
af854a3a-2127-422b-91ae-364da2661108http://lists.grok.org.uk/pipermail/full-disclosure/2007-April/054024.html
af854a3a-2127-422b-91ae-364da2661108http://osvdb.org/35438
af854a3a-2127-422b-91ae-364da2661108http://osvdb.org/35439
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/25007Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/28086
af854a3a-2127-422b-91ae-364da2661108http://securityreason.com/securityalert/2658
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2007/dsa-1434
af854a3a-2127-422b-91ae-364da2661108http://www.digit-labs.org/files/exploits/mydns-rr-smash.cExploit
af854a3a-2127-422b-91ae-364da2661108http://www.digit-labs.org/files/patches/mydns-update.c.diff
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/23694
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2007/1561
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/33933
Impacted products
Vendor Product Version
don_moore mydns 1.1.0



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:don_moore:mydns:1.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "40833162-A29F-4596-8B3B-E09EE19FF68F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple buffer overflows in MyDNS 1.1.0 allow remote attackers to (1) cause a denial of service (daemon crash) and possibly execute arbitrary code via a certain update, which triggers a heap-based buffer overflow in update.c; and (2) cause a denial of service (daemon crash) via unspecified vectors that trigger an off-by-one stack-based buffer overflow in update.c."
    },
    {
      "lang": "es",
      "value": "M\u00faltibles desbordamientos de b\u00fafer en MyDNS 1.1.0 permiten a atacantes remotos (1) provocar una denegaci\u00f3n de servicio (ca\u00edda del demonio) y posiblemente ejecutar c\u00f3digo de su elecci\u00f3n mediante una determinada actualizaci\u00f3n, la cual dispara un desbordamiento de b\u00fafer basado en mont\u00f3n en update.c; y (2) provocar una denegaci\u00f3n de servicio (ca\u00edda del demonio) mediante vectores no especificados que disparan un desbordamiento de b\u00fafer basado en pila por error de superaci\u00f3n de l\u00edmite (off-by-one) en update.c"
    }
  ],
  "evaluatorImpact": "Successful exploitation requires update privileges and that \"allow-update\" is set to \"yes\" in mydns.conf.",
  "id": "CVE-2007-2362",
  "lastModified": "2024-11-21T00:30:36.060",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 9.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2007-04-30T22:19:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2007-April/054024.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://osvdb.org/35438"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://osvdb.org/35439"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/25007"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/28086"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securityreason.com/securityalert/2658"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2007/dsa-1434"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.digit-labs.org/files/exploits/mydns-rr-smash.c"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.digit-labs.org/files/patches/mydns-update.c.diff"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/23694"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2007/1561"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33933"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2007-April/054024.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/35438"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/35439"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/25007"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/28086"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securityreason.com/securityalert/2658"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2007/dsa-1434"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.digit-labs.org/files/exploits/mydns-rr-smash.c"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.digit-labs.org/files/patches/mydns-update.c.diff"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/23694"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2007/1561"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33933"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2004-12-31 05:00
Modified
2024-11-20 23:49
Severity ?
Summary
Multiple implementations of the DNS protocol, including (1) Poslib 1.0.2-1 and earlier as used by Posadis, (2) Axis Network products before firmware 3.13, and (3) Men & Mice Suite 2.2x before 2.2.3 and 3.5.x before 3.5.2, allow remote attackers to cause a denial of service (CPU and network bandwidth consumption) by triggering a communications loop via (a) DNS query packets with localhost as a spoofed source address, or (b) a response packet that triggers a response packet.
Impacted products
Vendor Product Version
delegate delegate 7.7.0
delegate delegate 7.7.1
delegate delegate 7.8.0
delegate delegate 7.8.1
delegate delegate 7.8.2
delegate delegate 7.9.11
delegate delegate 8.3.3
delegate delegate 8.3.4
delegate delegate 8.4.0
delegate delegate 8.5.0
delegate delegate 8.9
delegate delegate 8.9.1
delegate delegate 8.9.2
delegate delegate 8.9.3
delegate delegate 8.9.4
delegate delegate 8.9.5
dnrd dnrd 1.0
dnrd dnrd 1.1
dnrd dnrd 1.2
dnrd dnrd 1.3
dnrd dnrd 1.4
dnrd dnrd 2.0
dnrd dnrd 2.1
dnrd dnrd 2.2
dnrd dnrd 2.3
dnrd dnrd 2.4
dnrd dnrd 2.5
dnrd dnrd 2.6
dnrd dnrd 2.7
dnrd dnrd 2.8
dnrd dnrd 2.9
dnrd dnrd 2.10
don_moore mydns 0.6
don_moore mydns 0.7
don_moore mydns 0.8
don_moore mydns 0.9
don_moore mydns 0.10.0
maradns maradns 0.5.28
maradns maradns 0.5.29
maradns maradns 0.5.30
maradns maradns 0.5.31
maradns maradns 0.8.05
pliant pliant_dns_server *
posadis posadis 0.50.4
posadis posadis 0.50.5
posadis posadis 0.50.6
posadis posadis 0.50.7
posadis posadis 0.50.8
posadis posadis 0.50.9
posadis posadis 0.60.0
posadis posadis 0.60.1
posadis posadis m5pre1
posadis posadis m5pre2
qbik wingate 3.0
qbik wingate 4.0.1
qbik wingate 4.1_beta_a
qbik wingate 6.0
qbik wingate 6.0.1_build_993
qbik wingate 6.0.1_build_995
team_johnlong raidendnsd *
axis 2100_network_camera 2.0
axis 2100_network_camera 2.01
axis 2100_network_camera 2.02
axis 2100_network_camera 2.03
axis 2100_network_camera 2.12
axis 2100_network_camera 2.30
axis 2100_network_camera 2.31
axis 2100_network_camera 2.32
axis 2100_network_camera 2.33
axis 2100_network_camera 2.34
axis 2100_network_camera 2.40
axis 2100_network_camera 2.41
axis 2110_network_camera 2.12
axis 2110_network_camera 2.30
axis 2110_network_camera 2.31
axis 2110_network_camera 2.32
axis 2110_network_camera 2.34
axis 2110_network_camera 2.40
axis 2110_network_camera 2.41
axis 2120_network_camera 2.12
axis 2120_network_camera 2.30
axis 2120_network_camera 2.31
axis 2120_network_camera 2.32
axis 2120_network_camera 2.34
axis 2120_network_camera 2.40
axis 2120_network_camera 2.41
axis 2400_video_server 3.11
axis 2400_video_server 3.12
axis 2401_video_server 3.12
axis 2420_network_camera 2.12
axis 2420_network_camera 2.30
axis 2420_network_camera 2.31
axis 2420_network_camera 2.32
axis 2420_network_camera 2.33
axis 2420_network_camera 2.34
axis 2420_network_camera 2.40
axis 2420_network_camera 2.41
axis 2460_network_dvr 3.12



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:delegate:delegate:7.7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F9180C95-FF6F-4A0C-9DE0-DFF6D8387698",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:delegate:delegate:7.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "68FA1404-9FA2-4379-96BC-6D7970C0EAA5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:delegate:delegate:7.8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "EABEE7AB-7C45-473E-9873-0423F2249F96",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:delegate:delegate:7.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1F66F57-6AEB-4E3C-B148-BC7D11E1EBEC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:delegate:delegate:7.8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "611AD3E5-708F-46BB-B21D-09598E1C4771",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:delegate:delegate:7.9.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD59AEEB-D524-4337-8962-B29863CBC889",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:delegate:delegate:8.3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "F15245AF-B9B6-4D46-A901-A781FC0BAF24",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:delegate:delegate:8.3.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7A3E1EB-89A5-4326-8977-9B462065C39B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:delegate:delegate:8.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BD607D2-2B07-474B-A855-2C3319B42CED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:delegate:delegate:8.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE4B4665-84C4-4129-9916-ABAC61B81FF5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:delegate:delegate:8.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "4131A4A5-5D67-4522-9A6E-E708815B5B86",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:delegate:delegate:8.9.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8C30DD0-C957-44BA-B44C-7B424E664B52",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:delegate:delegate:8.9.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC2E24A5-A864-4F42-A053-2FDA9D09A4B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:delegate:delegate:8.9.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "0993A56D-3A68-464A-B580-BE2EC3846F3E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:delegate:delegate:8.9.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EF6186E-90D1-4D22-A469-0E955D5F1EF7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:delegate:delegate:8.9.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "7323E750-C596-46FC-AA85-9271CC9C2CE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dnrd:dnrd:1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F7EA693-9873-4201-B66D-D0AC08E7F560",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dnrd:dnrd:1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "022F8E8E-F6A1-4782-82D0-686E6FADCF44",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dnrd:dnrd:1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "A9E269F0-8CFD-45DB-AF82-F9F57EDD0D1B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dnrd:dnrd:1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "752CC26D-33D2-43F1-A43B-E101553895C6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dnrd:dnrd:1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "317134CF-981A-44CC-B068-BA762AED5EB6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dnrd:dnrd:2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "20BAB657-CAB8-4473-9EE5-5F725F2EB1E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dnrd:dnrd:2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "84D1387B-91E2-4AC8-B387-B50F4D7DFDC5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dnrd:dnrd:2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "19028501-E538-4F36-8DF7-3D2A76D86895",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dnrd:dnrd:2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "F7173317-9F5E-4F80-A957-02084B8DC8C2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dnrd:dnrd:2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "297935D9-E108-4DB1-B4C8-2AC43DB6EA04",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dnrd:dnrd:2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "770BBF88-63D2-4AD6-B28F-5664DFFD746E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dnrd:dnrd:2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "45B16588-35CA-4640-8FA8-BC63D91C7416",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dnrd:dnrd:2.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "8FA35F28-CAA5-4C03-ABB8-4647537CC8E0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dnrd:dnrd:2.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "9DAC824F-2031-4427-BF38-C32A7644D2B7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dnrd:dnrd:2.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "7884CCA6-2031-41DB-860D-AF18047AF617",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:dnrd:dnrd:2.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "A906D87C-5557-4FC0-BBF3-7169EF35DEAE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:don_moore:mydns:0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC34DC23-117A-403E-9C87-79B1C512A5DA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:don_moore:mydns:0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "BFE559DF-3874-42E7-BB5B-8968E52D7A04",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:don_moore:mydns:0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "11068A01-20FB-4039-8919-85CF93F0FF2C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:don_moore:mydns:0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "9435E392-AE02-48A8-9A2D-3D1593DA3DC6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:don_moore:mydns:0.10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "D3B3D730-15C0-494A-A0B6-231C9F370A58",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:maradns:maradns:0.5.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "A917E7C9-BC1A-4D62-9A89-9D73A748D926",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:maradns:maradns:0.5.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0A01622-5254-4B3B-9412-771BE7400FA9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:maradns:maradns:0.5.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A3A5A98-3544-4A95-8436-0DF013B22CD7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:maradns:maradns:0.5.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "BECF00EC-A188-4B7F-BA51-3AAC3B4195B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:maradns:maradns:0.8.05:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD2370B5-681D-469F-B07C-B9212A975C60",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:pliant:pliant_dns_server:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA13B142-71F9-475E-A28A-DDE94BE0E7FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:posadis:posadis:0.50.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "1930E3DE-67BE-41F2-B8E3-BA8E18762C91",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:posadis:posadis:0.50.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "17C7DD08-C349-4687-8FAF-CCD211A9C166",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:posadis:posadis:0.50.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "981611C8-B957-428B-9500-37C60AE0E7E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:posadis:posadis:0.50.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "D34782A9-4CCB-45AD-BA23-EE98EE218B3C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:posadis:posadis:0.50.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A9D2517-4EAF-4DB9-B0EE-51F65671D45F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:posadis:posadis:0.50.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "0FA40391-39D5-4CB7-BB8E-048C4ECBC3C2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:posadis:posadis:0.60.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "135BFFE3-FF18-4462-9D19-2DF986E947DC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:posadis:posadis:0.60.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD907CE8-E0CD-46AA-A9E4-3D0FA3939DAB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:posadis:posadis:m5pre1:*:*:*:*:*:*:*",
              "matchCriteriaId": "530D1254-DC0A-4A7C-9520-D0F45B9AF278",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:posadis:posadis:m5pre2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C3BF047-0339-4064-9B3B-68E96F1AB1B2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:qbik:wingate:3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C7BC4C8-FB7B-4A88-B97B-984D9AA8EA1D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:qbik:wingate:4.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C1D98E1-EBE1-4697-906F-E29C91D9074D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:qbik:wingate:4.1_beta_a:*:*:*:*:*:*:*",
              "matchCriteriaId": "8AB1D7C0-E484-4441-AA68-FBA5A3309547",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:qbik:wingate:6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3F0670C-C07E-4A84-952B-88200D2D9B14",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:qbik:wingate:6.0.1_build_993:*:*:*:*:*:*:*",
              "matchCriteriaId": "82CD8E2B-37BF-4989-ABF3-9EC8E6F1C079",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:qbik:wingate:6.0.1_build_995:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CCFB397-9F5F-42F8-ABB3-9700F100D43D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:team_johnlong:raidendnsd:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F4967B8F-D25F-4B55-842E-0C7819EDA88A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:axis:2100_network_camera:2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "37F0C4C8-E648-4486-BFE3-23333FCFF118",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:axis:2100_network_camera:2.01:*:*:*:*:*:*:*",
              "matchCriteriaId": "56647964-82B3-4A7A-BE0D-C252654F8CBB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:axis:2100_network_camera:2.02:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7B83A6F-1996-49B7-BA76-98B83548F289",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:axis:2100_network_camera:2.03:*:*:*:*:*:*:*",
              "matchCriteriaId": "E021E51E-EA28-4E61-A08A-A590984A483E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:axis:2100_network_camera:2.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "94ABCB8C-8EED-4635-BA54-735CA12A1F64",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:axis:2100_network_camera:2.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "38C70CE1-0116-4C91-AB59-0C0D9F17099B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:axis:2100_network_camera:2.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "44B1C47A-938B-4F9B-B4B5-88B8622DC965",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:axis:2100_network_camera:2.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "E890E332-7A3B-4B6A-91B3-7FEFAF5DBA6E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:axis:2100_network_camera:2.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "4830EAF7-9504-4090-8DDD-6CC6658ABFD4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:axis:2100_network_camera:2.34:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E26AD96-7BA4-4722-B059-6444FFC2E6D3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:axis:2100_network_camera:2.40:*:*:*:*:*:*:*",
              "matchCriteriaId": "E06E7446-34EC-428A-82EE-2E24F2908C97",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:axis:2100_network_camera:2.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D4996E0-097B-4B79-8A1C-CE55F94B8D29",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:axis:2110_network_camera:2.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "0200586F-7F71-47F6-8D2E-F06E1BF418E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:axis:2110_network_camera:2.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5764F35-7F21-40D0-A3FF-8EEF97F7931D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:axis:2110_network_camera:2.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "6BE3CF46-91CC-4AFD-B178-48AE90E0E339",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:axis:2110_network_camera:2.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "D79A54BC-789D-4ED2-B3BC-C42959D7FFF7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:axis:2110_network_camera:2.34:*:*:*:*:*:*:*",
              "matchCriteriaId": "79A8A437-5AF7-448E-9AF8-D8FBA481CFE2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:axis:2110_network_camera:2.40:*:*:*:*:*:*:*",
              "matchCriteriaId": "5663D3D1-5962-4C43-B689-089EAFE25FD5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:axis:2110_network_camera:2.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "34EDC537-0EFF-46EA-8368-A690480E5D6E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:axis:2120_network_camera:2.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "39798220-4621-4C5D-B6A7-6639D02E0C07",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:axis:2120_network_camera:2.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "05EF66A4-F7BB-40C3-9CBF-5DB8715780C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:axis:2120_network_camera:2.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "9DCA7249-7F8F-4A2D-B98F-6AA0ECF17D7F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:axis:2120_network_camera:2.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "0E942419-3272-4267-AF23-4B6071D71277",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:axis:2120_network_camera:2.34:*:*:*:*:*:*:*",
              "matchCriteriaId": "3848A541-4F14-4E3B-99EE-B7C5A886C541",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:axis:2120_network_camera:2.40:*:*:*:*:*:*:*",
              "matchCriteriaId": "34E980E1-62B8-4E37-AE9D-DFE033053620",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:axis:2120_network_camera:2.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "730E6E09-C0C8-4F8A-BE07-BFED00FC1235",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:axis:2400_video_server:3.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "81100E37-1B99-4317-829F-B4A2278FA323",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:axis:2400_video_server:3.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "10321B16-1675-4609-8267-3971A9062AF0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:axis:2401_video_server:3.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "35F0E1BA-D05F-41CB-ACD9-035A6DF4735E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:axis:2420_network_camera:2.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "1DD73320-38DA-4606-9CEA-F0C9D5A3215F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:axis:2420_network_camera:2.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8374F1E-06BC-4A9E-8666-336AACC1F5BB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:axis:2420_network_camera:2.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "DAA3F905-8AC0-42A3-AC63-BA61AE6619AE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:axis:2420_network_camera:2.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "46E11270-65DE-4C07-A103-66217691069E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:axis:2420_network_camera:2.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "7B93D2AD-FA36-4A6C-AC52-6FD0F3AE6A80",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:axis:2420_network_camera:2.34:*:*:*:*:*:*:*",
              "matchCriteriaId": "D109CF38-0F5F-4A20-8A4A-DBE14D7826CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:axis:2420_network_camera:2.40:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA6E6FEA-9D2E-4ACD-8C3A-98DA4EB1C994",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:axis:2420_network_camera:2.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "10B4A828-33F4-4FB7-9637-3C761A73AEF9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:axis:2460_network_dvr:3.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "41CB517F-BDC9-40D0-AB0D-2DFC7669E8F0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple implementations of the DNS protocol, including (1) Poslib 1.0.2-1 and earlier as used by Posadis, (2) Axis Network products before firmware 3.13, and (3) Men \u0026 Mice Suite 2.2x before 2.2.3 and 3.5.x before 3.5.2, allow remote attackers to cause a denial of service (CPU and network bandwidth consumption) by triggering a communications loop via (a) DNS query packets with localhost as a spoofed source address, or (b) a response packet that triggers a response packet."
    }
  ],
  "id": "CVE-2004-0789",
  "lastModified": "2024-11-20T23:49:24.677",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2004-12-31T05:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://secunia.com/advisories/13145"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://securitytracker.com/id?1012157"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.niscc.gov.uk/niscc/docs/al-20041130-00862.html?lang=en"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.niscc.gov.uk/niscc/docs/re-20041109-00957.pdf"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.posadis.org/advisories/pos_adv_006.txt"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/11642"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17997"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://secunia.com/advisories/13145"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://securitytracker.com/id?1012157"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.niscc.gov.uk/niscc/docs/al-20041130-00862.html?lang=en"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.niscc.gov.uk/niscc/docs/re-20041109-00957.pdf"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.posadis.org/advisories/pos_adv_006.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/11642"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17997"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

cve-2006-2075
Vulnerability from cvelistv5
Published
2006-04-27 22:00
Modified
2024-08-07 17:35
Severity ?
Summary
Unspecified vulnerability in MyDNS 1.1.0 allows remote attackers to cause a denial of service via a crafted DNS message, aka "Query-of-death," as demonstrated by the OUSPG PROTOS DNS test suite.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T17:35:31.287Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "dns-improper-request-handling(26081)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26081"
          },
          {
            "name": "VU#955777",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT-VN",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/955777"
          },
          {
            "name": "ADV-2006-1505",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/1505"
          },
          {
            "name": "1015990",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1015990"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.niscc.gov.uk/niscc/docs/re-20060425-00312.pdf?lang=en"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.niscc.gov.uk/niscc/docs/br-20060425-00311.html?lang=en"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2006-04-25T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Unspecified vulnerability in MyDNS 1.1.0 allows remote attackers to cause a denial of service via a crafted DNS message, aka \"Query-of-death,\" as demonstrated by the OUSPG PROTOS DNS test suite."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-19T15:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "dns-improper-request-handling(26081)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26081"
        },
        {
          "name": "VU#955777",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT-VN"
          ],
          "url": "http://www.kb.cert.org/vuls/id/955777"
        },
        {
          "name": "ADV-2006-1505",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/1505"
        },
        {
          "name": "1015990",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1015990"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.niscc.gov.uk/niscc/docs/re-20060425-00312.pdf?lang=en"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.niscc.gov.uk/niscc/docs/br-20060425-00311.html?lang=en"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2006-2075",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Unspecified vulnerability in MyDNS 1.1.0 allows remote attackers to cause a denial of service via a crafted DNS message, aka \"Query-of-death,\" as demonstrated by the OUSPG PROTOS DNS test suite."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "dns-improper-request-handling(26081)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26081"
            },
            {
              "name": "VU#955777",
              "refsource": "CERT-VN",
              "url": "http://www.kb.cert.org/vuls/id/955777"
            },
            {
              "name": "ADV-2006-1505",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/1505"
            },
            {
              "name": "1015990",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1015990"
            },
            {
              "name": "http://www.niscc.gov.uk/niscc/docs/re-20060425-00312.pdf?lang=en",
              "refsource": "MISC",
              "url": "http://www.niscc.gov.uk/niscc/docs/re-20060425-00312.pdf?lang=en"
            },
            {
              "name": "http://www.niscc.gov.uk/niscc/docs/br-20060425-00311.html?lang=en",
              "refsource": "MISC",
              "url": "http://www.niscc.gov.uk/niscc/docs/br-20060425-00311.html?lang=en"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2006-2075",
    "datePublished": "2006-04-27T22:00:00",
    "dateReserved": "2006-04-27T00:00:00",
    "dateUpdated": "2024-08-07T17:35:31.287Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2004-0789
Vulnerability from cvelistv5
Published
2005-09-01 04:00
Modified
2024-08-08 00:31
Severity ?
Summary
Multiple implementations of the DNS protocol, including (1) Poslib 1.0.2-1 and earlier as used by Posadis, (2) Axis Network products before firmware 3.13, and (3) Men & Mice Suite 2.2x before 2.2.3 and 3.5.x before 3.5.2, allow remote attackers to cause a denial of service (CPU and network bandwidth consumption) by triggering a communications loop via (a) DNS query packets with localhost as a spoofed source address, or (b) a response packet that triggers a response packet.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T00:31:46.847Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "13145",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/13145"
          },
          {
            "name": "dns-localhost-dos(17997)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17997"
          },
          {
            "name": "1012157",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1012157"
          },
          {
            "name": "11642",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/11642"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.niscc.gov.uk/niscc/docs/al-20041130-00862.html?lang=en"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.posadis.org/advisories/pos_adv_006.txt"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.niscc.gov.uk/niscc/docs/re-20041109-00957.pdf"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2004-11-30T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple implementations of the DNS protocol, including (1) Poslib 1.0.2-1 and earlier as used by Posadis, (2) Axis Network products before firmware 3.13, and (3) Men \u0026 Mice Suite 2.2x before 2.2.3 and 3.5.x before 3.5.2, allow remote attackers to cause a denial of service (CPU and network bandwidth consumption) by triggering a communications loop via (a) DNS query packets with localhost as a spoofed source address, or (b) a response packet that triggers a response packet."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-10T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "13145",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/13145"
        },
        {
          "name": "dns-localhost-dos(17997)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17997"
        },
        {
          "name": "1012157",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1012157"
        },
        {
          "name": "11642",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/11642"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.niscc.gov.uk/niscc/docs/al-20041130-00862.html?lang=en"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.posadis.org/advisories/pos_adv_006.txt"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.niscc.gov.uk/niscc/docs/re-20041109-00957.pdf"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2004-0789",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple implementations of the DNS protocol, including (1) Poslib 1.0.2-1 and earlier as used by Posadis, (2) Axis Network products before firmware 3.13, and (3) Men \u0026 Mice Suite 2.2x before 2.2.3 and 3.5.x before 3.5.2, allow remote attackers to cause a denial of service (CPU and network bandwidth consumption) by triggering a communications loop via (a) DNS query packets with localhost as a spoofed source address, or (b) a response packet that triggers a response packet."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "13145",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/13145"
            },
            {
              "name": "dns-localhost-dos(17997)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17997"
            },
            {
              "name": "1012157",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1012157"
            },
            {
              "name": "11642",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/11642"
            },
            {
              "name": "http://www.niscc.gov.uk/niscc/docs/al-20041130-00862.html?lang=en",
              "refsource": "MISC",
              "url": "http://www.niscc.gov.uk/niscc/docs/al-20041130-00862.html?lang=en"
            },
            {
              "name": "http://www.posadis.org/advisories/pos_adv_006.txt",
              "refsource": "CONFIRM",
              "url": "http://www.posadis.org/advisories/pos_adv_006.txt"
            },
            {
              "name": "http://www.niscc.gov.uk/niscc/docs/re-20041109-00957.pdf",
              "refsource": "MISC",
              "url": "http://www.niscc.gov.uk/niscc/docs/re-20041109-00957.pdf"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2004-0789",
    "datePublished": "2005-09-01T04:00:00",
    "dateReserved": "2004-08-17T00:00:00",
    "dateUpdated": "2024-08-08T00:31:46.847Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2007-2362
Vulnerability from cvelistv5
Published
2007-04-30 22:00
Modified
2024-08-07 13:33
Severity ?
Summary
Multiple buffer overflows in MyDNS 1.1.0 allow remote attackers to (1) cause a denial of service (daemon crash) and possibly execute arbitrary code via a certain update, which triggers a heap-based buffer overflow in update.c; and (2) cause a denial of service (daemon crash) via unspecified vectors that trigger an off-by-one stack-based buffer overflow in update.c.
References
https://exchange.xforce.ibmcloud.com/vulnerabilities/33933vdb-entry, x_refsource_XF
http://osvdb.org/35439vdb-entry, x_refsource_OSVDB
http://lists.grok.org.uk/pipermail/full-disclosure/2007-April/054024.htmlmailing-list, x_refsource_FULLDISC
http://securityreason.com/securityalert/2658third-party-advisory, x_refsource_SREASON
http://www.securityfocus.com/bid/23694vdb-entry, x_refsource_BID
http://www.debian.org/security/2007/dsa-1434vendor-advisory, x_refsource_DEBIAN
http://secunia.com/advisories/25007third-party-advisory, x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2007/1561vdb-entry, x_refsource_VUPEN
http://www.digit-labs.org/files/exploits/mydns-rr-smash.cx_refsource_MISC
http://osvdb.org/35438vdb-entry, x_refsource_OSVDB
http://secunia.com/advisories/28086third-party-advisory, x_refsource_SECUNIA
http://www.digit-labs.org/files/patches/mydns-update.c.diffx_refsource_MISC
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T13:33:28.645Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "mydns-update-bo(33933)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33933"
          },
          {
            "name": "35439",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/35439"
          },
          {
            "name": "20070427 mydns-1.1.0 remote heap overflow",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2007-April/054024.html"
          },
          {
            "name": "2658",
            "tags": [
              "third-party-advisory",
              "x_refsource_SREASON",
              "x_transferred"
            ],
            "url": "http://securityreason.com/securityalert/2658"
          },
          {
            "name": "23694",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/23694"
          },
          {
            "name": "DSA-1434",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2007/dsa-1434"
          },
          {
            "name": "25007",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/25007"
          },
          {
            "name": "ADV-2007-1561",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2007/1561"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.digit-labs.org/files/exploits/mydns-rr-smash.c"
          },
          {
            "name": "35438",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/35438"
          },
          {
            "name": "28086",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/28086"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.digit-labs.org/files/patches/mydns-update.c.diff"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2007-04-27T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple buffer overflows in MyDNS 1.1.0 allow remote attackers to (1) cause a denial of service (daemon crash) and possibly execute arbitrary code via a certain update, which triggers a heap-based buffer overflow in update.c; and (2) cause a denial of service (daemon crash) via unspecified vectors that trigger an off-by-one stack-based buffer overflow in update.c."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-28T12:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "mydns-update-bo(33933)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33933"
        },
        {
          "name": "35439",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/35439"
        },
        {
          "name": "20070427 mydns-1.1.0 remote heap overflow",
          "tags": [
            "mailing-list",
            "x_refsource_FULLDISC"
          ],
          "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2007-April/054024.html"
        },
        {
          "name": "2658",
          "tags": [
            "third-party-advisory",
            "x_refsource_SREASON"
          ],
          "url": "http://securityreason.com/securityalert/2658"
        },
        {
          "name": "23694",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/23694"
        },
        {
          "name": "DSA-1434",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2007/dsa-1434"
        },
        {
          "name": "25007",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/25007"
        },
        {
          "name": "ADV-2007-1561",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2007/1561"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.digit-labs.org/files/exploits/mydns-rr-smash.c"
        },
        {
          "name": "35438",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/35438"
        },
        {
          "name": "28086",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/28086"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.digit-labs.org/files/patches/mydns-update.c.diff"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2007-2362",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple buffer overflows in MyDNS 1.1.0 allow remote attackers to (1) cause a denial of service (daemon crash) and possibly execute arbitrary code via a certain update, which triggers a heap-based buffer overflow in update.c; and (2) cause a denial of service (daemon crash) via unspecified vectors that trigger an off-by-one stack-based buffer overflow in update.c."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "mydns-update-bo(33933)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33933"
            },
            {
              "name": "35439",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/35439"
            },
            {
              "name": "20070427 mydns-1.1.0 remote heap overflow",
              "refsource": "FULLDISC",
              "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2007-April/054024.html"
            },
            {
              "name": "2658",
              "refsource": "SREASON",
              "url": "http://securityreason.com/securityalert/2658"
            },
            {
              "name": "23694",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/23694"
            },
            {
              "name": "DSA-1434",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2007/dsa-1434"
            },
            {
              "name": "25007",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/25007"
            },
            {
              "name": "ADV-2007-1561",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2007/1561"
            },
            {
              "name": "http://www.digit-labs.org/files/exploits/mydns-rr-smash.c",
              "refsource": "MISC",
              "url": "http://www.digit-labs.org/files/exploits/mydns-rr-smash.c"
            },
            {
              "name": "35438",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/35438"
            },
            {
              "name": "28086",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/28086"
            },
            {
              "name": "http://www.digit-labs.org/files/patches/mydns-update.c.diff",
              "refsource": "MISC",
              "url": "http://www.digit-labs.org/files/patches/mydns-update.c.diff"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2007-2362",
    "datePublished": "2007-04-30T22:00:00",
    "dateReserved": "2007-04-30T00:00:00",
    "dateUpdated": "2024-08-07T13:33:28.645Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2006-0351
Vulnerability from cvelistv5
Published
2006-01-21 01:00
Modified
2024-08-07 16:34
Severity ?
Summary
Unspecified "critical denial-of-service vulnerability" in MyDNS before 1.1.0 has unknown impact and attack vectors.
References
http://www.debian.org/security/2006/dsa-963vendor-advisory, x_refsource_DEBIAN
https://exchange.xforce.ibmcloud.com/vulnerabilities/24228vdb-entry, x_refsource_XF
http://secunia.com/advisories/18653third-party-advisory, x_refsource_SECUNIA
http://mydns.bboy.net/download/changelog.htmlx_refsource_CONFIRM
http://secunia.com/advisories/18641third-party-advisory, x_refsource_SECUNIA
http://www.securityfocus.com/bid/16431vdb-entry, x_refsource_BID
http://www.gentoo.org/security/en/glsa/glsa-200601-16.xmlvendor-advisory, x_refsource_GENTOO
http://secunia.com/advisories/18532third-party-advisory, x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2006/0256vdb-entry, x_refsource_VUPEN
http://securitytracker.com/id?1015521vdb-entry, x_refsource_SECTRACK
http://www.osvdb.org/22636vdb-entry, x_refsource_OSVDB
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T16:34:14.559Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "DSA-963",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2006/dsa-963"
          },
          {
            "name": "mydns-query-dos(24228)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24228"
          },
          {
            "name": "18653",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/18653"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://mydns.bboy.net/download/changelog.html"
          },
          {
            "name": "18641",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/18641"
          },
          {
            "name": "16431",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/16431"
          },
          {
            "name": "GLSA-200601-16",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://www.gentoo.org/security/en/glsa/glsa-200601-16.xml"
          },
          {
            "name": "18532",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/18532"
          },
          {
            "name": "ADV-2006-0256",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/0256"
          },
          {
            "name": "1015521",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1015521"
          },
          {
            "name": "22636",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/22636"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2006-01-18T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Unspecified \"critical denial-of-service vulnerability\" in MyDNS before 1.1.0 has unknown impact and attack vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-19T15:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "DSA-963",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2006/dsa-963"
        },
        {
          "name": "mydns-query-dos(24228)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24228"
        },
        {
          "name": "18653",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/18653"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://mydns.bboy.net/download/changelog.html"
        },
        {
          "name": "18641",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/18641"
        },
        {
          "name": "16431",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/16431"
        },
        {
          "name": "GLSA-200601-16",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://www.gentoo.org/security/en/glsa/glsa-200601-16.xml"
        },
        {
          "name": "18532",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/18532"
        },
        {
          "name": "ADV-2006-0256",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/0256"
        },
        {
          "name": "1015521",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1015521"
        },
        {
          "name": "22636",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/22636"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2006-0351",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Unspecified \"critical denial-of-service vulnerability\" in MyDNS before 1.1.0 has unknown impact and attack vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "DSA-963",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2006/dsa-963"
            },
            {
              "name": "mydns-query-dos(24228)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24228"
            },
            {
              "name": "18653",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/18653"
            },
            {
              "name": "http://mydns.bboy.net/download/changelog.html",
              "refsource": "CONFIRM",
              "url": "http://mydns.bboy.net/download/changelog.html"
            },
            {
              "name": "18641",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/18641"
            },
            {
              "name": "16431",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/16431"
            },
            {
              "name": "GLSA-200601-16",
              "refsource": "GENTOO",
              "url": "http://www.gentoo.org/security/en/glsa/glsa-200601-16.xml"
            },
            {
              "name": "18532",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/18532"
            },
            {
              "name": "ADV-2006-0256",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/0256"
            },
            {
              "name": "1015521",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1015521"
            },
            {
              "name": "22636",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/22636"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2006-0351",
    "datePublished": "2006-01-21T01:00:00",
    "dateReserved": "2006-01-21T00:00:00",
    "dateUpdated": "2024-08-07T16:34:14.559Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}