fkie_cve-2006-0351
Vulnerability from fkie_nvd
Published
2006-01-21 01:03
Modified
2025-04-03 01:03
Severity ?
Summary
Unspecified "critical denial-of-service vulnerability" in MyDNS before 1.1.0 has unknown impact and attack vectors.
References
cve@mitre.orghttp://mydns.bboy.net/download/changelog.html
cve@mitre.orghttp://secunia.com/advisories/18532Patch, Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/18641
cve@mitre.orghttp://secunia.com/advisories/18653
cve@mitre.orghttp://securitytracker.com/id?1015521
cve@mitre.orghttp://www.debian.org/security/2006/dsa-963
cve@mitre.orghttp://www.gentoo.org/security/en/glsa/glsa-200601-16.xml
cve@mitre.orghttp://www.osvdb.org/22636Patch
cve@mitre.orghttp://www.securityfocus.com/bid/16431
cve@mitre.orghttp://www.vupen.com/english/advisories/2006/0256
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/24228
af854a3a-2127-422b-91ae-364da2661108http://mydns.bboy.net/download/changelog.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18532Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18641
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/18653
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1015521
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2006/dsa-963
af854a3a-2127-422b-91ae-364da2661108http://www.gentoo.org/security/en/glsa/glsa-200601-16.xml
af854a3a-2127-422b-91ae-364da2661108http://www.osvdb.org/22636Patch
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/16431
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2006/0256
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/24228
Impacted products



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:don_moore:mydns:0.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "CC34DC23-117A-403E-9C87-79B1C512A5DA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:don_moore:mydns:0.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "BFE559DF-3874-42E7-BB5B-8968E52D7A04",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:don_moore:mydns:0.7.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "F5359874-602B-4EB2-8F30-A9E3E418556E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:don_moore:mydns:0.8:*:*:*:*:*:*:*",
                     matchCriteriaId: "11068A01-20FB-4039-8919-85CF93F0FF2C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:don_moore:mydns:0.8.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "8B5B6A09-E166-4139-A592-76E1A9BB496A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:don_moore:mydns:0.8.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "E0D64650-5955-4269-8D08-4B0CD410C9DC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:don_moore:mydns:0.8.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "CCBD3BDC-4BBD-45EE-9C63-5DB564FF2F9F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:don_moore:mydns:0.9.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "BDA0BB14-D934-4308-8D3E-287BC08CCF5C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:don_moore:mydns:0.9.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "6881A5E3-253C-4668-9795-955A06A82049",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:don_moore:mydns:0.9.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "1EC1A4DE-B032-4A64-8154-DA56B52E7E2A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:don_moore:mydns:0.9.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "1F13CDFF-77C6-4C3C-9A41-5752577102B2",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:don_moore:mydns:0.9.5:*:*:*:*:*:*:*",
                     matchCriteriaId: "B49E1F37-6877-4F38-968B-46CD49FA3171",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:don_moore:mydns:0.9.6:*:*:*:*:*:*:*",
                     matchCriteriaId: "6878C5C9-F0B7-4290-9EEB-8404BD77BFCB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:don_moore:mydns:0.9.7:*:*:*:*:*:*:*",
                     matchCriteriaId: "7465EA92-7DEA-4CE9-89F0-A42B289816DF",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:don_moore:mydns:0.9.8:*:*:*:*:*:*:*",
                     matchCriteriaId: "68B7259A-EE66-4967-A8E7-978BD8DE1695",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:don_moore:mydns:0.9.9:*:*:*:*:*:*:*",
                     matchCriteriaId: "D1505551-DE83-4ED4-8417-391397BA1475",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:don_moore:mydns:0.9.10:*:*:*:*:*:*:*",
                     matchCriteriaId: "13C31DDD-02F6-4BFA-A5A4-DC8EAE4C2227",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:don_moore:mydns:0.9.12:*:*:*:*:*:*:*",
                     matchCriteriaId: "5CAB367C-AF5F-4DA5-826D-A7A41ABB3F60",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:don_moore:mydns:0.9.13:*:*:*:*:*:*:*",
                     matchCriteriaId: "22C37E6C-257F-488B-A107-B05164AE4543",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:don_moore:mydns:0.10.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "D3B3D730-15C0-494A-A0B6-231C9F370A58",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:don_moore:mydns:0.10.1:*:*:*:*:*:*:*",
                     matchCriteriaId: "E2A940A2-02E3-4F2F-9D91-A54C7FBD4531",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:don_moore:mydns:0.10.2:*:*:*:*:*:*:*",
                     matchCriteriaId: "20F25AD9-E73C-4CC1-8572-7EB79641FFA4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:don_moore:mydns:0.10.3:*:*:*:*:*:*:*",
                     matchCriteriaId: "34615890-E75D-40F9-A653-D2655CDF9057",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:don_moore:mydns:0.10.4:*:*:*:*:*:*:*",
                     matchCriteriaId: "7201B3E5-3F6F-4BAF-9FB6-A5F1C81B894C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:don_moore:mydns:0.11.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "53CDDF69-6514-46C9-ADC1-4ACAEF6093BE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:don_moore:mydns:1.0.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "3361EA61-9ACF-4836-8C44-C45EE29F9BF7",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Unspecified \"critical denial-of-service vulnerability\" in MyDNS before 1.1.0 has unknown impact and attack vectors.",
      },
   ],
   id: "CVE-2006-0351",
   lastModified: "2025-04-03T01:03:51.193",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 5,
               confidentialityImpact: "NONE",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2006-01-21T01:03:00.000",
   references: [
      {
         source: "cve@mitre.org",
         url: "http://mydns.bboy.net/download/changelog.html",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/18532",
      },
      {
         source: "cve@mitre.org",
         url: "http://secunia.com/advisories/18641",
      },
      {
         source: "cve@mitre.org",
         url: "http://secunia.com/advisories/18653",
      },
      {
         source: "cve@mitre.org",
         url: "http://securitytracker.com/id?1015521",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.debian.org/security/2006/dsa-963",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.gentoo.org/security/en/glsa/glsa-200601-16.xml",
      },
      {
         source: "cve@mitre.org",
         tags: [
            "Patch",
         ],
         url: "http://www.osvdb.org/22636",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.securityfocus.com/bid/16431",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.vupen.com/english/advisories/2006/0256",
      },
      {
         source: "cve@mitre.org",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/24228",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://mydns.bboy.net/download/changelog.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/18532",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/18641",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://secunia.com/advisories/18653",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://securitytracker.com/id?1015521",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.debian.org/security/2006/dsa-963",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.gentoo.org/security/en/glsa/glsa-200601-16.xml",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Patch",
         ],
         url: "http://www.osvdb.org/22636",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.securityfocus.com/bid/16431",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.vupen.com/english/advisories/2006/0256",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/24228",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Deferred",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-Other",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}


Log in or create an account to share your comment.

Security Advisory comment format.

This schema specifies the format of a comment related to a security advisory.

UUIDv4 of the comment
UUIDv4 of the Vulnerability-Lookup instance
When the comment was created originally
When the comment was last updated
Title of the comment
Description of the comment
The identifier of the vulnerability (CVE ID, GHSA-ID, PYSEC ID, etc.).



Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.