All the vulnerabilites related to don_moore - mydns
Vulnerability from fkie_nvd
Published
2006-01-21 01:03
Modified
2024-11-21 00:06
Severity ?
Summary
Unspecified "critical denial-of-service vulnerability" in MyDNS before 1.1.0 has unknown impact and attack vectors.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
don_moore | mydns | 0.6 | |
don_moore | mydns | 0.7 | |
don_moore | mydns | 0.7.1 | |
don_moore | mydns | 0.8 | |
don_moore | mydns | 0.8.1 | |
don_moore | mydns | 0.8.2 | |
don_moore | mydns | 0.8.3 | |
don_moore | mydns | 0.9.0 | |
don_moore | mydns | 0.9.1 | |
don_moore | mydns | 0.9.2 | |
don_moore | mydns | 0.9.3 | |
don_moore | mydns | 0.9.5 | |
don_moore | mydns | 0.9.6 | |
don_moore | mydns | 0.9.7 | |
don_moore | mydns | 0.9.8 | |
don_moore | mydns | 0.9.9 | |
don_moore | mydns | 0.9.10 | |
don_moore | mydns | 0.9.12 | |
don_moore | mydns | 0.9.13 | |
don_moore | mydns | 0.10.0 | |
don_moore | mydns | 0.10.1 | |
don_moore | mydns | 0.10.2 | |
don_moore | mydns | 0.10.3 | |
don_moore | mydns | 0.10.4 | |
don_moore | mydns | 0.11.0 | |
don_moore | mydns | 1.0.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:don_moore:mydns:0.6:*:*:*:*:*:*:*", "matchCriteriaId": "CC34DC23-117A-403E-9C87-79B1C512A5DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:don_moore:mydns:0.7:*:*:*:*:*:*:*", "matchCriteriaId": "BFE559DF-3874-42E7-BB5B-8968E52D7A04", "vulnerable": true }, { "criteria": "cpe:2.3:a:don_moore:mydns:0.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "F5359874-602B-4EB2-8F30-A9E3E418556E", "vulnerable": true }, { "criteria": "cpe:2.3:a:don_moore:mydns:0.8:*:*:*:*:*:*:*", "matchCriteriaId": "11068A01-20FB-4039-8919-85CF93F0FF2C", "vulnerable": true }, { "criteria": "cpe:2.3:a:don_moore:mydns:0.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "8B5B6A09-E166-4139-A592-76E1A9BB496A", "vulnerable": true }, { "criteria": "cpe:2.3:a:don_moore:mydns:0.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "E0D64650-5955-4269-8D08-4B0CD410C9DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:don_moore:mydns:0.8.3:*:*:*:*:*:*:*", "matchCriteriaId": "CCBD3BDC-4BBD-45EE-9C63-5DB564FF2F9F", "vulnerable": true }, { "criteria": "cpe:2.3:a:don_moore:mydns:0.9.0:*:*:*:*:*:*:*", "matchCriteriaId": "BDA0BB14-D934-4308-8D3E-287BC08CCF5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:don_moore:mydns:0.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "6881A5E3-253C-4668-9795-955A06A82049", "vulnerable": true }, { "criteria": "cpe:2.3:a:don_moore:mydns:0.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "1EC1A4DE-B032-4A64-8154-DA56B52E7E2A", "vulnerable": true }, { "criteria": "cpe:2.3:a:don_moore:mydns:0.9.3:*:*:*:*:*:*:*", "matchCriteriaId": "1F13CDFF-77C6-4C3C-9A41-5752577102B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:don_moore:mydns:0.9.5:*:*:*:*:*:*:*", "matchCriteriaId": "B49E1F37-6877-4F38-968B-46CD49FA3171", "vulnerable": true }, { "criteria": "cpe:2.3:a:don_moore:mydns:0.9.6:*:*:*:*:*:*:*", "matchCriteriaId": "6878C5C9-F0B7-4290-9EEB-8404BD77BFCB", "vulnerable": true }, { "criteria": "cpe:2.3:a:don_moore:mydns:0.9.7:*:*:*:*:*:*:*", "matchCriteriaId": "7465EA92-7DEA-4CE9-89F0-A42B289816DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:don_moore:mydns:0.9.8:*:*:*:*:*:*:*", "matchCriteriaId": "68B7259A-EE66-4967-A8E7-978BD8DE1695", "vulnerable": true }, { "criteria": "cpe:2.3:a:don_moore:mydns:0.9.9:*:*:*:*:*:*:*", "matchCriteriaId": "D1505551-DE83-4ED4-8417-391397BA1475", "vulnerable": true }, { "criteria": "cpe:2.3:a:don_moore:mydns:0.9.10:*:*:*:*:*:*:*", "matchCriteriaId": "13C31DDD-02F6-4BFA-A5A4-DC8EAE4C2227", "vulnerable": true }, { "criteria": "cpe:2.3:a:don_moore:mydns:0.9.12:*:*:*:*:*:*:*", "matchCriteriaId": "5CAB367C-AF5F-4DA5-826D-A7A41ABB3F60", "vulnerable": true }, { "criteria": "cpe:2.3:a:don_moore:mydns:0.9.13:*:*:*:*:*:*:*", "matchCriteriaId": "22C37E6C-257F-488B-A107-B05164AE4543", "vulnerable": true }, { "criteria": "cpe:2.3:a:don_moore:mydns:0.10.0:*:*:*:*:*:*:*", "matchCriteriaId": "D3B3D730-15C0-494A-A0B6-231C9F370A58", "vulnerable": true }, { "criteria": "cpe:2.3:a:don_moore:mydns:0.10.1:*:*:*:*:*:*:*", "matchCriteriaId": "E2A940A2-02E3-4F2F-9D91-A54C7FBD4531", "vulnerable": true }, { "criteria": "cpe:2.3:a:don_moore:mydns:0.10.2:*:*:*:*:*:*:*", "matchCriteriaId": "20F25AD9-E73C-4CC1-8572-7EB79641FFA4", "vulnerable": true }, { "criteria": "cpe:2.3:a:don_moore:mydns:0.10.3:*:*:*:*:*:*:*", "matchCriteriaId": "34615890-E75D-40F9-A653-D2655CDF9057", "vulnerable": true }, { "criteria": "cpe:2.3:a:don_moore:mydns:0.10.4:*:*:*:*:*:*:*", "matchCriteriaId": "7201B3E5-3F6F-4BAF-9FB6-A5F1C81B894C", "vulnerable": true }, { "criteria": "cpe:2.3:a:don_moore:mydns:0.11.0:*:*:*:*:*:*:*", "matchCriteriaId": "53CDDF69-6514-46C9-ADC1-4ACAEF6093BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:don_moore:mydns:1.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "3361EA61-9ACF-4836-8C44-C45EE29F9BF7", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unspecified \"critical denial-of-service vulnerability\" in MyDNS before 1.1.0 has unknown impact and attack vectors." } ], "id": "CVE-2006-0351", "lastModified": "2024-11-21T00:06:15.863", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2006-01-21T01:03:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://mydns.bboy.net/download/changelog.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/18532" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/18641" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/18653" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1015521" }, { "source": "cve@mitre.org", "url": "http://www.debian.org/security/2006/dsa-963" }, { "source": "cve@mitre.org", "url": "http://www.gentoo.org/security/en/glsa/glsa-200601-16.xml" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.osvdb.org/22636" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/16431" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2006/0256" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24228" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://mydns.bboy.net/download/changelog.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/18532" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/18641" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/18653" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1015521" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2006/dsa-963" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.gentoo.org/security/en/glsa/glsa-200601-16.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.osvdb.org/22636" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/16431" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2006/0256" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24228" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2006-04-27 22:03
Modified
2024-11-21 00:10
Severity ?
Summary
Unspecified vulnerability in MyDNS 1.1.0 allows remote attackers to cause a denial of service via a crafted DNS message, aka "Query-of-death," as demonstrated by the OUSPG PROTOS DNS test suite.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:don_moore:mydns:1.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "40833162-A29F-4596-8B3B-E09EE19FF68F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in MyDNS 1.1.0 allows remote attackers to cause a denial of service via a crafted DNS message, aka \"Query-of-death,\" as demonstrated by the OUSPG PROTOS DNS test suite." } ], "id": "CVE-2006-2075", "lastModified": "2024-11-21T00:10:29.960", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2006-04-27T22:03:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://securitytracker.com/id?1015990" }, { "source": "cve@mitre.org", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/955777" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.niscc.gov.uk/niscc/docs/br-20060425-00311.html?lang=en" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.niscc.gov.uk/niscc/docs/re-20060425-00312.pdf?lang=en" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2006/1505" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26081" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://securitytracker.com/id?1015990" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/955777" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.niscc.gov.uk/niscc/docs/br-20060425-00311.html?lang=en" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.niscc.gov.uk/niscc/docs/re-20060425-00312.pdf?lang=en" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2006/1505" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26081" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2007-04-30 22:19
Modified
2024-11-21 00:30
Severity ?
Summary
Multiple buffer overflows in MyDNS 1.1.0 allow remote attackers to (1) cause a denial of service (daemon crash) and possibly execute arbitrary code via a certain update, which triggers a heap-based buffer overflow in update.c; and (2) cause a denial of service (daemon crash) via unspecified vectors that trigger an off-by-one stack-based buffer overflow in update.c.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:don_moore:mydns:1.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "40833162-A29F-4596-8B3B-E09EE19FF68F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple buffer overflows in MyDNS 1.1.0 allow remote attackers to (1) cause a denial of service (daemon crash) and possibly execute arbitrary code via a certain update, which triggers a heap-based buffer overflow in update.c; and (2) cause a denial of service (daemon crash) via unspecified vectors that trigger an off-by-one stack-based buffer overflow in update.c." }, { "lang": "es", "value": "M\u00faltibles desbordamientos de b\u00fafer en MyDNS 1.1.0 permiten a atacantes remotos (1) provocar una denegaci\u00f3n de servicio (ca\u00edda del demonio) y posiblemente ejecutar c\u00f3digo de su elecci\u00f3n mediante una determinada actualizaci\u00f3n, la cual dispara un desbordamiento de b\u00fafer basado en mont\u00f3n en update.c; y (2) provocar una denegaci\u00f3n de servicio (ca\u00edda del demonio) mediante vectores no especificados que disparan un desbordamiento de b\u00fafer basado en pila por error de superaci\u00f3n de l\u00edmite (off-by-one) en update.c" } ], "evaluatorImpact": "Successful exploitation requires update privileges and that \"allow-update\" is set to \"yes\" in mydns.conf.", "id": "CVE-2007-2362", "lastModified": "2024-11-21T00:30:36.060", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2007-04-30T22:19:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2007-April/054024.html" }, { "source": "cve@mitre.org", "url": "http://osvdb.org/35438" }, { "source": "cve@mitre.org", "url": "http://osvdb.org/35439" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/25007" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/28086" }, { "source": "cve@mitre.org", "url": "http://securityreason.com/securityalert/2658" }, { "source": "cve@mitre.org", "url": "http://www.debian.org/security/2007/dsa-1434" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.digit-labs.org/files/exploits/mydns-rr-smash.c" }, { "source": "cve@mitre.org", "url": "http://www.digit-labs.org/files/patches/mydns-update.c.diff" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/23694" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2007/1561" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33933" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2007-April/054024.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/35438" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/35439" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/25007" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/28086" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securityreason.com/securityalert/2658" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2007/dsa-1434" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.digit-labs.org/files/exploits/mydns-rr-smash.c" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.digit-labs.org/files/patches/mydns-update.c.diff" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/23694" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2007/1561" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33933" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2004-12-31 05:00
Modified
2024-11-20 23:49
Severity ?
Summary
Multiple implementations of the DNS protocol, including (1) Poslib 1.0.2-1 and earlier as used by Posadis, (2) Axis Network products before firmware 3.13, and (3) Men & Mice Suite 2.2x before 2.2.3 and 3.5.x before 3.5.2, allow remote attackers to cause a denial of service (CPU and network bandwidth consumption) by triggering a communications loop via (a) DNS query packets with localhost as a spoofed source address, or (b) a response packet that triggers a response packet.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:delegate:delegate:7.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "F9180C95-FF6F-4A0C-9DE0-DFF6D8387698", "vulnerable": true }, { "criteria": "cpe:2.3:a:delegate:delegate:7.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "68FA1404-9FA2-4379-96BC-6D7970C0EAA5", "vulnerable": true }, { "criteria": "cpe:2.3:a:delegate:delegate:7.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "EABEE7AB-7C45-473E-9873-0423F2249F96", "vulnerable": true }, { "criteria": "cpe:2.3:a:delegate:delegate:7.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "A1F66F57-6AEB-4E3C-B148-BC7D11E1EBEC", "vulnerable": true }, { "criteria": "cpe:2.3:a:delegate:delegate:7.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "611AD3E5-708F-46BB-B21D-09598E1C4771", "vulnerable": true }, { "criteria": "cpe:2.3:a:delegate:delegate:7.9.11:*:*:*:*:*:*:*", "matchCriteriaId": "AD59AEEB-D524-4337-8962-B29863CBC889", "vulnerable": true }, { "criteria": "cpe:2.3:a:delegate:delegate:8.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "F15245AF-B9B6-4D46-A901-A781FC0BAF24", "vulnerable": true }, { "criteria": "cpe:2.3:a:delegate:delegate:8.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "C7A3E1EB-89A5-4326-8977-9B462065C39B", "vulnerable": true }, { "criteria": "cpe:2.3:a:delegate:delegate:8.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "1BD607D2-2B07-474B-A855-2C3319B42CED", "vulnerable": true }, { "criteria": "cpe:2.3:a:delegate:delegate:8.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "BE4B4665-84C4-4129-9916-ABAC61B81FF5", "vulnerable": true }, { "criteria": "cpe:2.3:a:delegate:delegate:8.9:*:*:*:*:*:*:*", "matchCriteriaId": "4131A4A5-5D67-4522-9A6E-E708815B5B86", "vulnerable": true }, { "criteria": "cpe:2.3:a:delegate:delegate:8.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "F8C30DD0-C957-44BA-B44C-7B424E664B52", "vulnerable": true }, { "criteria": "cpe:2.3:a:delegate:delegate:8.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "EC2E24A5-A864-4F42-A053-2FDA9D09A4B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:delegate:delegate:8.9.3:*:*:*:*:*:*:*", "matchCriteriaId": "0993A56D-3A68-464A-B580-BE2EC3846F3E", "vulnerable": true }, { "criteria": "cpe:2.3:a:delegate:delegate:8.9.4:*:*:*:*:*:*:*", "matchCriteriaId": "1EF6186E-90D1-4D22-A469-0E955D5F1EF7", "vulnerable": true }, { "criteria": "cpe:2.3:a:delegate:delegate:8.9.5:*:*:*:*:*:*:*", "matchCriteriaId": "7323E750-C596-46FC-AA85-9271CC9C2CE7", "vulnerable": true }, { "criteria": "cpe:2.3:a:dnrd:dnrd:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "8F7EA693-9873-4201-B66D-D0AC08E7F560", "vulnerable": true }, { "criteria": "cpe:2.3:a:dnrd:dnrd:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "022F8E8E-F6A1-4782-82D0-686E6FADCF44", "vulnerable": true }, { "criteria": "cpe:2.3:a:dnrd:dnrd:1.2:*:*:*:*:*:*:*", "matchCriteriaId": "A9E269F0-8CFD-45DB-AF82-F9F57EDD0D1B", "vulnerable": true }, { "criteria": "cpe:2.3:a:dnrd:dnrd:1.3:*:*:*:*:*:*:*", "matchCriteriaId": "752CC26D-33D2-43F1-A43B-E101553895C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:dnrd:dnrd:1.4:*:*:*:*:*:*:*", "matchCriteriaId": "317134CF-981A-44CC-B068-BA762AED5EB6", "vulnerable": true }, { "criteria": "cpe:2.3:a:dnrd:dnrd:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "20BAB657-CAB8-4473-9EE5-5F725F2EB1E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:dnrd:dnrd:2.1:*:*:*:*:*:*:*", "matchCriteriaId": "84D1387B-91E2-4AC8-B387-B50F4D7DFDC5", "vulnerable": true }, { "criteria": "cpe:2.3:a:dnrd:dnrd:2.2:*:*:*:*:*:*:*", "matchCriteriaId": "19028501-E538-4F36-8DF7-3D2A76D86895", "vulnerable": true }, { "criteria": "cpe:2.3:a:dnrd:dnrd:2.3:*:*:*:*:*:*:*", "matchCriteriaId": "F7173317-9F5E-4F80-A957-02084B8DC8C2", "vulnerable": true }, { "criteria": "cpe:2.3:a:dnrd:dnrd:2.4:*:*:*:*:*:*:*", "matchCriteriaId": "297935D9-E108-4DB1-B4C8-2AC43DB6EA04", "vulnerable": true }, { "criteria": "cpe:2.3:a:dnrd:dnrd:2.5:*:*:*:*:*:*:*", "matchCriteriaId": "770BBF88-63D2-4AD6-B28F-5664DFFD746E", "vulnerable": true }, { "criteria": "cpe:2.3:a:dnrd:dnrd:2.6:*:*:*:*:*:*:*", "matchCriteriaId": "45B16588-35CA-4640-8FA8-BC63D91C7416", "vulnerable": true }, { "criteria": "cpe:2.3:a:dnrd:dnrd:2.7:*:*:*:*:*:*:*", "matchCriteriaId": "8FA35F28-CAA5-4C03-ABB8-4647537CC8E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:dnrd:dnrd:2.8:*:*:*:*:*:*:*", "matchCriteriaId": "9DAC824F-2031-4427-BF38-C32A7644D2B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:dnrd:dnrd:2.9:*:*:*:*:*:*:*", "matchCriteriaId": "7884CCA6-2031-41DB-860D-AF18047AF617", "vulnerable": true }, { "criteria": "cpe:2.3:a:dnrd:dnrd:2.10:*:*:*:*:*:*:*", "matchCriteriaId": "A906D87C-5557-4FC0-BBF3-7169EF35DEAE", "vulnerable": true }, { "criteria": "cpe:2.3:a:don_moore:mydns:0.6:*:*:*:*:*:*:*", "matchCriteriaId": "CC34DC23-117A-403E-9C87-79B1C512A5DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:don_moore:mydns:0.7:*:*:*:*:*:*:*", "matchCriteriaId": "BFE559DF-3874-42E7-BB5B-8968E52D7A04", "vulnerable": true }, { "criteria": "cpe:2.3:a:don_moore:mydns:0.8:*:*:*:*:*:*:*", "matchCriteriaId": "11068A01-20FB-4039-8919-85CF93F0FF2C", "vulnerable": true }, { "criteria": "cpe:2.3:a:don_moore:mydns:0.9:*:*:*:*:*:*:*", "matchCriteriaId": "9435E392-AE02-48A8-9A2D-3D1593DA3DC6", "vulnerable": true }, { "criteria": "cpe:2.3:a:don_moore:mydns:0.10.0:*:*:*:*:*:*:*", "matchCriteriaId": "D3B3D730-15C0-494A-A0B6-231C9F370A58", "vulnerable": true }, { "criteria": "cpe:2.3:a:maradns:maradns:0.5.28:*:*:*:*:*:*:*", "matchCriteriaId": "A917E7C9-BC1A-4D62-9A89-9D73A748D926", "vulnerable": true }, { "criteria": "cpe:2.3:a:maradns:maradns:0.5.29:*:*:*:*:*:*:*", "matchCriteriaId": "E0A01622-5254-4B3B-9412-771BE7400FA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:maradns:maradns:0.5.30:*:*:*:*:*:*:*", "matchCriteriaId": "2A3A5A98-3544-4A95-8436-0DF013B22CD7", "vulnerable": true }, { "criteria": "cpe:2.3:a:maradns:maradns:0.5.31:*:*:*:*:*:*:*", "matchCriteriaId": "BECF00EC-A188-4B7F-BA51-3AAC3B4195B4", "vulnerable": true }, { "criteria": "cpe:2.3:a:maradns:maradns:0.8.05:*:*:*:*:*:*:*", "matchCriteriaId": "AD2370B5-681D-469F-B07C-B9212A975C60", "vulnerable": true }, { "criteria": "cpe:2.3:a:pliant:pliant_dns_server:*:*:*:*:*:*:*:*", "matchCriteriaId": "FA13B142-71F9-475E-A28A-DDE94BE0E7FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:posadis:posadis:0.50.4:*:*:*:*:*:*:*", "matchCriteriaId": "1930E3DE-67BE-41F2-B8E3-BA8E18762C91", "vulnerable": true }, { "criteria": "cpe:2.3:a:posadis:posadis:0.50.5:*:*:*:*:*:*:*", "matchCriteriaId": "17C7DD08-C349-4687-8FAF-CCD211A9C166", "vulnerable": true }, { "criteria": "cpe:2.3:a:posadis:posadis:0.50.6:*:*:*:*:*:*:*", "matchCriteriaId": "981611C8-B957-428B-9500-37C60AE0E7E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:posadis:posadis:0.50.7:*:*:*:*:*:*:*", "matchCriteriaId": "D34782A9-4CCB-45AD-BA23-EE98EE218B3C", "vulnerable": true }, { "criteria": "cpe:2.3:a:posadis:posadis:0.50.8:*:*:*:*:*:*:*", "matchCriteriaId": "1A9D2517-4EAF-4DB9-B0EE-51F65671D45F", "vulnerable": true }, { "criteria": "cpe:2.3:a:posadis:posadis:0.50.9:*:*:*:*:*:*:*", "matchCriteriaId": "0FA40391-39D5-4CB7-BB8E-048C4ECBC3C2", "vulnerable": true }, { "criteria": "cpe:2.3:a:posadis:posadis:0.60.0:*:*:*:*:*:*:*", "matchCriteriaId": "135BFFE3-FF18-4462-9D19-2DF986E947DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:posadis:posadis:0.60.1:*:*:*:*:*:*:*", "matchCriteriaId": "DD907CE8-E0CD-46AA-A9E4-3D0FA3939DAB", "vulnerable": true }, { "criteria": "cpe:2.3:a:posadis:posadis:m5pre1:*:*:*:*:*:*:*", "matchCriteriaId": "530D1254-DC0A-4A7C-9520-D0F45B9AF278", "vulnerable": true }, { "criteria": "cpe:2.3:a:posadis:posadis:m5pre2:*:*:*:*:*:*:*", "matchCriteriaId": "5C3BF047-0339-4064-9B3B-68E96F1AB1B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:qbik:wingate:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "4C7BC4C8-FB7B-4A88-B97B-984D9AA8EA1D", "vulnerable": true }, { "criteria": "cpe:2.3:a:qbik:wingate:4.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "0C1D98E1-EBE1-4697-906F-E29C91D9074D", "vulnerable": true }, { "criteria": "cpe:2.3:a:qbik:wingate:4.1_beta_a:*:*:*:*:*:*:*", "matchCriteriaId": "8AB1D7C0-E484-4441-AA68-FBA5A3309547", "vulnerable": true }, { "criteria": "cpe:2.3:a:qbik:wingate:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "E3F0670C-C07E-4A84-952B-88200D2D9B14", "vulnerable": true }, { "criteria": "cpe:2.3:a:qbik:wingate:6.0.1_build_993:*:*:*:*:*:*:*", "matchCriteriaId": "82CD8E2B-37BF-4989-ABF3-9EC8E6F1C079", "vulnerable": true }, { "criteria": "cpe:2.3:a:qbik:wingate:6.0.1_build_995:*:*:*:*:*:*:*", "matchCriteriaId": "2CCFB397-9F5F-42F8-ABB3-9700F100D43D", "vulnerable": true }, { "criteria": "cpe:2.3:a:team_johnlong:raidendnsd:*:*:*:*:*:*:*:*", "matchCriteriaId": "F4967B8F-D25F-4B55-842E-0C7819EDA88A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:axis:2100_network_camera:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "37F0C4C8-E648-4486-BFE3-23333FCFF118", "vulnerable": true }, { "criteria": "cpe:2.3:h:axis:2100_network_camera:2.01:*:*:*:*:*:*:*", "matchCriteriaId": "56647964-82B3-4A7A-BE0D-C252654F8CBB", "vulnerable": true }, { "criteria": "cpe:2.3:h:axis:2100_network_camera:2.02:*:*:*:*:*:*:*", "matchCriteriaId": "C7B83A6F-1996-49B7-BA76-98B83548F289", "vulnerable": true }, { "criteria": "cpe:2.3:h:axis:2100_network_camera:2.03:*:*:*:*:*:*:*", "matchCriteriaId": "E021E51E-EA28-4E61-A08A-A590984A483E", "vulnerable": true }, { "criteria": "cpe:2.3:h:axis:2100_network_camera:2.12:*:*:*:*:*:*:*", "matchCriteriaId": "94ABCB8C-8EED-4635-BA54-735CA12A1F64", "vulnerable": true }, { "criteria": "cpe:2.3:h:axis:2100_network_camera:2.30:*:*:*:*:*:*:*", "matchCriteriaId": "38C70CE1-0116-4C91-AB59-0C0D9F17099B", "vulnerable": true }, { "criteria": "cpe:2.3:h:axis:2100_network_camera:2.31:*:*:*:*:*:*:*", "matchCriteriaId": "44B1C47A-938B-4F9B-B4B5-88B8622DC965", "vulnerable": true }, { "criteria": "cpe:2.3:h:axis:2100_network_camera:2.32:*:*:*:*:*:*:*", "matchCriteriaId": "E890E332-7A3B-4B6A-91B3-7FEFAF5DBA6E", "vulnerable": true }, { "criteria": "cpe:2.3:h:axis:2100_network_camera:2.33:*:*:*:*:*:*:*", "matchCriteriaId": "4830EAF7-9504-4090-8DDD-6CC6658ABFD4", "vulnerable": true }, { "criteria": "cpe:2.3:h:axis:2100_network_camera:2.34:*:*:*:*:*:*:*", "matchCriteriaId": "7E26AD96-7BA4-4722-B059-6444FFC2E6D3", "vulnerable": true }, { "criteria": "cpe:2.3:h:axis:2100_network_camera:2.40:*:*:*:*:*:*:*", "matchCriteriaId": "E06E7446-34EC-428A-82EE-2E24F2908C97", "vulnerable": true }, { "criteria": "cpe:2.3:h:axis:2100_network_camera:2.41:*:*:*:*:*:*:*", "matchCriteriaId": "8D4996E0-097B-4B79-8A1C-CE55F94B8D29", "vulnerable": true }, { "criteria": "cpe:2.3:h:axis:2110_network_camera:2.12:*:*:*:*:*:*:*", "matchCriteriaId": "0200586F-7F71-47F6-8D2E-F06E1BF418E7", "vulnerable": true }, { "criteria": "cpe:2.3:h:axis:2110_network_camera:2.30:*:*:*:*:*:*:*", "matchCriteriaId": "F5764F35-7F21-40D0-A3FF-8EEF97F7931D", "vulnerable": true }, { "criteria": "cpe:2.3:h:axis:2110_network_camera:2.31:*:*:*:*:*:*:*", "matchCriteriaId": "6BE3CF46-91CC-4AFD-B178-48AE90E0E339", "vulnerable": true }, { "criteria": "cpe:2.3:h:axis:2110_network_camera:2.32:*:*:*:*:*:*:*", "matchCriteriaId": "D79A54BC-789D-4ED2-B3BC-C42959D7FFF7", "vulnerable": true }, { "criteria": "cpe:2.3:h:axis:2110_network_camera:2.34:*:*:*:*:*:*:*", "matchCriteriaId": "79A8A437-5AF7-448E-9AF8-D8FBA481CFE2", "vulnerable": true }, { "criteria": "cpe:2.3:h:axis:2110_network_camera:2.40:*:*:*:*:*:*:*", "matchCriteriaId": "5663D3D1-5962-4C43-B689-089EAFE25FD5", "vulnerable": true }, { "criteria": "cpe:2.3:h:axis:2110_network_camera:2.41:*:*:*:*:*:*:*", "matchCriteriaId": "34EDC537-0EFF-46EA-8368-A690480E5D6E", "vulnerable": true }, { "criteria": "cpe:2.3:h:axis:2120_network_camera:2.12:*:*:*:*:*:*:*", "matchCriteriaId": "39798220-4621-4C5D-B6A7-6639D02E0C07", "vulnerable": true }, { "criteria": "cpe:2.3:h:axis:2120_network_camera:2.30:*:*:*:*:*:*:*", "matchCriteriaId": "05EF66A4-F7BB-40C3-9CBF-5DB8715780C9", "vulnerable": true }, { "criteria": "cpe:2.3:h:axis:2120_network_camera:2.31:*:*:*:*:*:*:*", "matchCriteriaId": "9DCA7249-7F8F-4A2D-B98F-6AA0ECF17D7F", "vulnerable": true }, { "criteria": "cpe:2.3:h:axis:2120_network_camera:2.32:*:*:*:*:*:*:*", "matchCriteriaId": "0E942419-3272-4267-AF23-4B6071D71277", "vulnerable": true }, { "criteria": "cpe:2.3:h:axis:2120_network_camera:2.34:*:*:*:*:*:*:*", "matchCriteriaId": "3848A541-4F14-4E3B-99EE-B7C5A886C541", "vulnerable": true }, { "criteria": "cpe:2.3:h:axis:2120_network_camera:2.40:*:*:*:*:*:*:*", "matchCriteriaId": "34E980E1-62B8-4E37-AE9D-DFE033053620", "vulnerable": true }, { "criteria": "cpe:2.3:h:axis:2120_network_camera:2.41:*:*:*:*:*:*:*", "matchCriteriaId": "730E6E09-C0C8-4F8A-BE07-BFED00FC1235", "vulnerable": true }, { "criteria": "cpe:2.3:h:axis:2400_video_server:3.11:*:*:*:*:*:*:*", "matchCriteriaId": "81100E37-1B99-4317-829F-B4A2278FA323", "vulnerable": true }, { "criteria": "cpe:2.3:h:axis:2400_video_server:3.12:*:*:*:*:*:*:*", "matchCriteriaId": "10321B16-1675-4609-8267-3971A9062AF0", "vulnerable": true }, { "criteria": "cpe:2.3:h:axis:2401_video_server:3.12:*:*:*:*:*:*:*", "matchCriteriaId": "35F0E1BA-D05F-41CB-ACD9-035A6DF4735E", "vulnerable": true }, { "criteria": "cpe:2.3:h:axis:2420_network_camera:2.12:*:*:*:*:*:*:*", "matchCriteriaId": "1DD73320-38DA-4606-9CEA-F0C9D5A3215F", "vulnerable": true }, { "criteria": "cpe:2.3:h:axis:2420_network_camera:2.30:*:*:*:*:*:*:*", "matchCriteriaId": "B8374F1E-06BC-4A9E-8666-336AACC1F5BB", "vulnerable": true }, { "criteria": "cpe:2.3:h:axis:2420_network_camera:2.31:*:*:*:*:*:*:*", "matchCriteriaId": "DAA3F905-8AC0-42A3-AC63-BA61AE6619AE", "vulnerable": true }, { "criteria": "cpe:2.3:h:axis:2420_network_camera:2.32:*:*:*:*:*:*:*", "matchCriteriaId": "46E11270-65DE-4C07-A103-66217691069E", "vulnerable": true }, { "criteria": "cpe:2.3:h:axis:2420_network_camera:2.33:*:*:*:*:*:*:*", "matchCriteriaId": "7B93D2AD-FA36-4A6C-AC52-6FD0F3AE6A80", "vulnerable": true }, { "criteria": "cpe:2.3:h:axis:2420_network_camera:2.34:*:*:*:*:*:*:*", "matchCriteriaId": "D109CF38-0F5F-4A20-8A4A-DBE14D7826CD", "vulnerable": true }, { "criteria": "cpe:2.3:h:axis:2420_network_camera:2.40:*:*:*:*:*:*:*", "matchCriteriaId": "EA6E6FEA-9D2E-4ACD-8C3A-98DA4EB1C994", "vulnerable": true }, { "criteria": "cpe:2.3:h:axis:2420_network_camera:2.41:*:*:*:*:*:*:*", "matchCriteriaId": "10B4A828-33F4-4FB7-9637-3C761A73AEF9", "vulnerable": true }, { "criteria": "cpe:2.3:h:axis:2460_network_dvr:3.12:*:*:*:*:*:*:*", "matchCriteriaId": "41CB517F-BDC9-40D0-AB0D-2DFC7669E8F0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple implementations of the DNS protocol, including (1) Poslib 1.0.2-1 and earlier as used by Posadis, (2) Axis Network products before firmware 3.13, and (3) Men \u0026 Mice Suite 2.2x before 2.2.3 and 3.5.x before 3.5.2, allow remote attackers to cause a denial of service (CPU and network bandwidth consumption) by triggering a communications loop via (a) DNS query packets with localhost as a spoofed source address, or (b) a response packet that triggers a response packet." } ], "id": "CVE-2004-0789", "lastModified": "2024-11-20T23:49:24.677", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2004-12-31T05:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://secunia.com/advisories/13145" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://securitytracker.com/id?1012157" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.niscc.gov.uk/niscc/docs/al-20041130-00862.html?lang=en" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.niscc.gov.uk/niscc/docs/re-20041109-00957.pdf" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.posadis.org/advisories/pos_adv_006.txt" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/11642" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17997" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://secunia.com/advisories/13145" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://securitytracker.com/id?1012157" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.niscc.gov.uk/niscc/docs/al-20041130-00862.html?lang=en" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.niscc.gov.uk/niscc/docs/re-20041109-00957.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.posadis.org/advisories/pos_adv_006.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/11642" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17997" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
cve-2006-2075
Vulnerability from cvelistv5
Published
2006-04-27 22:00
Modified
2024-08-07 17:35
Severity ?
EPSS score ?
Summary
Unspecified vulnerability in MyDNS 1.1.0 allows remote attackers to cause a denial of service via a crafted DNS message, aka "Query-of-death," as demonstrated by the OUSPG PROTOS DNS test suite.
References
▼ | URL | Tags |
---|---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/26081 | vdb-entry, x_refsource_XF | |
http://www.kb.cert.org/vuls/id/955777 | third-party-advisory, x_refsource_CERT-VN | |
http://www.vupen.com/english/advisories/2006/1505 | vdb-entry, x_refsource_VUPEN | |
http://securitytracker.com/id?1015990 | vdb-entry, x_refsource_SECTRACK | |
http://www.niscc.gov.uk/niscc/docs/re-20060425-00312.pdf?lang=en | x_refsource_MISC | |
http://www.niscc.gov.uk/niscc/docs/br-20060425-00311.html?lang=en | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T17:35:31.287Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "dns-improper-request-handling(26081)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26081" }, { "name": "VU#955777", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/955777" }, { "name": "ADV-2006-1505", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2006/1505" }, { "name": "1015990", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1015990" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.niscc.gov.uk/niscc/docs/re-20060425-00312.pdf?lang=en" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.niscc.gov.uk/niscc/docs/br-20060425-00311.html?lang=en" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2006-04-25T00:00:00", "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in MyDNS 1.1.0 allows remote attackers to cause a denial of service via a crafted DNS message, aka \"Query-of-death,\" as demonstrated by the OUSPG PROTOS DNS test suite." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-19T15:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "dns-improper-request-handling(26081)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26081" }, { "name": "VU#955777", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/955777" }, { "name": "ADV-2006-1505", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2006/1505" }, { "name": "1015990", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1015990" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.niscc.gov.uk/niscc/docs/re-20060425-00312.pdf?lang=en" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.niscc.gov.uk/niscc/docs/br-20060425-00311.html?lang=en" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2006-2075", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unspecified vulnerability in MyDNS 1.1.0 allows remote attackers to cause a denial of service via a crafted DNS message, aka \"Query-of-death,\" as demonstrated by the OUSPG PROTOS DNS test suite." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "dns-improper-request-handling(26081)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26081" }, { "name": "VU#955777", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/955777" }, { "name": "ADV-2006-1505", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2006/1505" }, { "name": "1015990", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1015990" }, { "name": "http://www.niscc.gov.uk/niscc/docs/re-20060425-00312.pdf?lang=en", "refsource": "MISC", "url": "http://www.niscc.gov.uk/niscc/docs/re-20060425-00312.pdf?lang=en" }, { "name": "http://www.niscc.gov.uk/niscc/docs/br-20060425-00311.html?lang=en", "refsource": "MISC", "url": "http://www.niscc.gov.uk/niscc/docs/br-20060425-00311.html?lang=en" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2006-2075", "datePublished": "2006-04-27T22:00:00", "dateReserved": "2006-04-27T00:00:00", "dateUpdated": "2024-08-07T17:35:31.287Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2004-0789
Vulnerability from cvelistv5
Published
2005-09-01 04:00
Modified
2024-08-08 00:31
Severity ?
EPSS score ?
Summary
Multiple implementations of the DNS protocol, including (1) Poslib 1.0.2-1 and earlier as used by Posadis, (2) Axis Network products before firmware 3.13, and (3) Men & Mice Suite 2.2x before 2.2.3 and 3.5.x before 3.5.2, allow remote attackers to cause a denial of service (CPU and network bandwidth consumption) by triggering a communications loop via (a) DNS query packets with localhost as a spoofed source address, or (b) a response packet that triggers a response packet.
References
▼ | URL | Tags |
---|---|---|
http://secunia.com/advisories/13145 | third-party-advisory, x_refsource_SECUNIA | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/17997 | vdb-entry, x_refsource_XF | |
http://securitytracker.com/id?1012157 | vdb-entry, x_refsource_SECTRACK | |
http://www.securityfocus.com/bid/11642 | vdb-entry, x_refsource_BID | |
http://www.niscc.gov.uk/niscc/docs/al-20041130-00862.html?lang=en | x_refsource_MISC | |
http://www.posadis.org/advisories/pos_adv_006.txt | x_refsource_CONFIRM | |
http://www.niscc.gov.uk/niscc/docs/re-20041109-00957.pdf | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T00:31:46.847Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "13145", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/13145" }, { "name": "dns-localhost-dos(17997)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17997" }, { "name": "1012157", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1012157" }, { "name": "11642", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/11642" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.niscc.gov.uk/niscc/docs/al-20041130-00862.html?lang=en" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.posadis.org/advisories/pos_adv_006.txt" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.niscc.gov.uk/niscc/docs/re-20041109-00957.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2004-11-30T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple implementations of the DNS protocol, including (1) Poslib 1.0.2-1 and earlier as used by Posadis, (2) Axis Network products before firmware 3.13, and (3) Men \u0026 Mice Suite 2.2x before 2.2.3 and 3.5.x before 3.5.2, allow remote attackers to cause a denial of service (CPU and network bandwidth consumption) by triggering a communications loop via (a) DNS query packets with localhost as a spoofed source address, or (b) a response packet that triggers a response packet." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-10T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "13145", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/13145" }, { "name": "dns-localhost-dos(17997)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17997" }, { "name": "1012157", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1012157" }, { "name": "11642", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/11642" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.niscc.gov.uk/niscc/docs/al-20041130-00862.html?lang=en" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.posadis.org/advisories/pos_adv_006.txt" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.niscc.gov.uk/niscc/docs/re-20041109-00957.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2004-0789", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple implementations of the DNS protocol, including (1) Poslib 1.0.2-1 and earlier as used by Posadis, (2) Axis Network products before firmware 3.13, and (3) Men \u0026 Mice Suite 2.2x before 2.2.3 and 3.5.x before 3.5.2, allow remote attackers to cause a denial of service (CPU and network bandwidth consumption) by triggering a communications loop via (a) DNS query packets with localhost as a spoofed source address, or (b) a response packet that triggers a response packet." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "13145", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/13145" }, { "name": "dns-localhost-dos(17997)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17997" }, { "name": "1012157", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1012157" }, { "name": "11642", "refsource": "BID", "url": "http://www.securityfocus.com/bid/11642" }, { "name": "http://www.niscc.gov.uk/niscc/docs/al-20041130-00862.html?lang=en", "refsource": "MISC", "url": "http://www.niscc.gov.uk/niscc/docs/al-20041130-00862.html?lang=en" }, { "name": "http://www.posadis.org/advisories/pos_adv_006.txt", "refsource": "CONFIRM", "url": "http://www.posadis.org/advisories/pos_adv_006.txt" }, { "name": "http://www.niscc.gov.uk/niscc/docs/re-20041109-00957.pdf", "refsource": "MISC", "url": "http://www.niscc.gov.uk/niscc/docs/re-20041109-00957.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2004-0789", "datePublished": "2005-09-01T04:00:00", "dateReserved": "2004-08-17T00:00:00", "dateUpdated": "2024-08-08T00:31:46.847Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2007-2362
Vulnerability from cvelistv5
Published
2007-04-30 22:00
Modified
2024-08-07 13:33
Severity ?
EPSS score ?
Summary
Multiple buffer overflows in MyDNS 1.1.0 allow remote attackers to (1) cause a denial of service (daemon crash) and possibly execute arbitrary code via a certain update, which triggers a heap-based buffer overflow in update.c; and (2) cause a denial of service (daemon crash) via unspecified vectors that trigger an off-by-one stack-based buffer overflow in update.c.
References
▼ | URL | Tags |
---|---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/33933 | vdb-entry, x_refsource_XF | |
http://osvdb.org/35439 | vdb-entry, x_refsource_OSVDB | |
http://lists.grok.org.uk/pipermail/full-disclosure/2007-April/054024.html | mailing-list, x_refsource_FULLDISC | |
http://securityreason.com/securityalert/2658 | third-party-advisory, x_refsource_SREASON | |
http://www.securityfocus.com/bid/23694 | vdb-entry, x_refsource_BID | |
http://www.debian.org/security/2007/dsa-1434 | vendor-advisory, x_refsource_DEBIAN | |
http://secunia.com/advisories/25007 | third-party-advisory, x_refsource_SECUNIA | |
http://www.vupen.com/english/advisories/2007/1561 | vdb-entry, x_refsource_VUPEN | |
http://www.digit-labs.org/files/exploits/mydns-rr-smash.c | x_refsource_MISC | |
http://osvdb.org/35438 | vdb-entry, x_refsource_OSVDB | |
http://secunia.com/advisories/28086 | third-party-advisory, x_refsource_SECUNIA | |
http://www.digit-labs.org/files/patches/mydns-update.c.diff | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T13:33:28.645Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "mydns-update-bo(33933)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33933" }, { "name": "35439", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/35439" }, { "name": "20070427 mydns-1.1.0 remote heap overflow", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2007-April/054024.html" }, { "name": "2658", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/2658" }, { "name": "23694", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/23694" }, { "name": "DSA-1434", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2007/dsa-1434" }, { "name": "25007", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/25007" }, { "name": "ADV-2007-1561", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/1561" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.digit-labs.org/files/exploits/mydns-rr-smash.c" }, { "name": "35438", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/35438" }, { "name": "28086", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28086" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.digit-labs.org/files/patches/mydns-update.c.diff" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-04-27T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple buffer overflows in MyDNS 1.1.0 allow remote attackers to (1) cause a denial of service (daemon crash) and possibly execute arbitrary code via a certain update, which triggers a heap-based buffer overflow in update.c; and (2) cause a denial of service (daemon crash) via unspecified vectors that trigger an off-by-one stack-based buffer overflow in update.c." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-28T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "mydns-update-bo(33933)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33933" }, { "name": "35439", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/35439" }, { "name": "20070427 mydns-1.1.0 remote heap overflow", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2007-April/054024.html" }, { "name": "2658", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/2658" }, { "name": "23694", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/23694" }, { "name": "DSA-1434", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2007/dsa-1434" }, { "name": "25007", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/25007" }, { "name": "ADV-2007-1561", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/1561" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.digit-labs.org/files/exploits/mydns-rr-smash.c" }, { "name": "35438", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/35438" }, { "name": "28086", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28086" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.digit-labs.org/files/patches/mydns-update.c.diff" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-2362", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple buffer overflows in MyDNS 1.1.0 allow remote attackers to (1) cause a denial of service (daemon crash) and possibly execute arbitrary code via a certain update, which triggers a heap-based buffer overflow in update.c; and (2) cause a denial of service (daemon crash) via unspecified vectors that trigger an off-by-one stack-based buffer overflow in update.c." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "mydns-update-bo(33933)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33933" }, { "name": "35439", "refsource": "OSVDB", "url": "http://osvdb.org/35439" }, { "name": "20070427 mydns-1.1.0 remote heap overflow", "refsource": "FULLDISC", "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2007-April/054024.html" }, { "name": "2658", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/2658" }, { "name": "23694", "refsource": "BID", "url": "http://www.securityfocus.com/bid/23694" }, { "name": "DSA-1434", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2007/dsa-1434" }, { "name": "25007", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/25007" }, { "name": "ADV-2007-1561", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/1561" }, { "name": "http://www.digit-labs.org/files/exploits/mydns-rr-smash.c", "refsource": "MISC", "url": "http://www.digit-labs.org/files/exploits/mydns-rr-smash.c" }, { "name": "35438", "refsource": "OSVDB", "url": "http://osvdb.org/35438" }, { "name": "28086", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28086" }, { "name": "http://www.digit-labs.org/files/patches/mydns-update.c.diff", "refsource": "MISC", "url": "http://www.digit-labs.org/files/patches/mydns-update.c.diff" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-2362", "datePublished": "2007-04-30T22:00:00", "dateReserved": "2007-04-30T00:00:00", "dateUpdated": "2024-08-07T13:33:28.645Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2006-0351
Vulnerability from cvelistv5
Published
2006-01-21 01:00
Modified
2024-08-07 16:34
Severity ?
EPSS score ?
Summary
Unspecified "critical denial-of-service vulnerability" in MyDNS before 1.1.0 has unknown impact and attack vectors.
References
▼ | URL | Tags |
---|---|---|
http://www.debian.org/security/2006/dsa-963 | vendor-advisory, x_refsource_DEBIAN | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/24228 | vdb-entry, x_refsource_XF | |
http://secunia.com/advisories/18653 | third-party-advisory, x_refsource_SECUNIA | |
http://mydns.bboy.net/download/changelog.html | x_refsource_CONFIRM | |
http://secunia.com/advisories/18641 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securityfocus.com/bid/16431 | vdb-entry, x_refsource_BID | |
http://www.gentoo.org/security/en/glsa/glsa-200601-16.xml | vendor-advisory, x_refsource_GENTOO | |
http://secunia.com/advisories/18532 | third-party-advisory, x_refsource_SECUNIA | |
http://www.vupen.com/english/advisories/2006/0256 | vdb-entry, x_refsource_VUPEN | |
http://securitytracker.com/id?1015521 | vdb-entry, x_refsource_SECTRACK | |
http://www.osvdb.org/22636 | vdb-entry, x_refsource_OSVDB |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T16:34:14.559Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "DSA-963", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2006/dsa-963" }, { "name": "mydns-query-dos(24228)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24228" }, { "name": "18653", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/18653" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://mydns.bboy.net/download/changelog.html" }, { "name": "18641", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/18641" }, { "name": "16431", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/16431" }, { "name": "GLSA-200601-16", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200601-16.xml" }, { "name": "18532", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/18532" }, { "name": "ADV-2006-0256", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2006/0256" }, { "name": "1015521", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1015521" }, { "name": "22636", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/22636" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2006-01-18T00:00:00", "descriptions": [ { "lang": "en", "value": "Unspecified \"critical denial-of-service vulnerability\" in MyDNS before 1.1.0 has unknown impact and attack vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-19T15:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "DSA-963", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2006/dsa-963" }, { "name": "mydns-query-dos(24228)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24228" }, { "name": "18653", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/18653" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://mydns.bboy.net/download/changelog.html" }, { "name": "18641", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/18641" }, { "name": "16431", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/16431" }, { "name": "GLSA-200601-16", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200601-16.xml" }, { "name": "18532", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/18532" }, { "name": "ADV-2006-0256", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2006/0256" }, { "name": "1015521", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1015521" }, { "name": "22636", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/22636" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2006-0351", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unspecified \"critical denial-of-service vulnerability\" in MyDNS before 1.1.0 has unknown impact and attack vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "DSA-963", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2006/dsa-963" }, { "name": "mydns-query-dos(24228)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24228" }, { "name": "18653", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/18653" }, { "name": "http://mydns.bboy.net/download/changelog.html", "refsource": "CONFIRM", "url": "http://mydns.bboy.net/download/changelog.html" }, { "name": "18641", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/18641" }, { "name": "16431", "refsource": "BID", "url": "http://www.securityfocus.com/bid/16431" }, { "name": "GLSA-200601-16", "refsource": "GENTOO", "url": "http://www.gentoo.org/security/en/glsa/glsa-200601-16.xml" }, { "name": "18532", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/18532" }, { "name": "ADV-2006-0256", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2006/0256" }, { "name": "1015521", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1015521" }, { "name": "22636", "refsource": "OSVDB", "url": "http://www.osvdb.org/22636" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2006-0351", "datePublished": "2006-01-21T01:00:00", "dateReserved": "2006-01-21T00:00:00", "dateUpdated": "2024-08-07T16:34:14.559Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }