FKIE_CVE-2010-2444
Vulnerability from fkie_nvd - Published: 2010-06-25 18:30 - Updated: 2025-04-11 00:51
Severity ?
Summary
parse/Csv2_parse.c in MaraDNS 1.3.03, and other versions before 1.4.03, does not properly handle hostnames that do not end in a "." (dot) character, which allows remote attackers to cause a denial of service (NULL pointer dereference) via a crafted csv2 zone file.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| maradns | maradns | 1.3.03 | |
| maradns | maradns | 1.3.04 | |
| maradns | maradns | 1.3.05 | |
| maradns | maradns | 1.3.06 | |
| maradns | maradns | 1.3.07.01 | |
| maradns | maradns | 1.3.07.02 | |
| maradns | maradns | 1.3.07.03 | |
| maradns | maradns | 1.3.07.04 | |
| maradns | maradns | 1.3.07.05 | |
| maradns | maradns | 1.3.07.06 | |
| maradns | maradns | 1.3.07.07 | |
| maradns | maradns | 1.3.07.08 | |
| maradns | maradns | 1.3.07.09 | |
| maradns | maradns | 1.3.08 | |
| maradns | maradns | 1.3.09 | |
| maradns | maradns | 1.3.10 | |
| maradns | maradns | 1.3.11 | |
| maradns | maradns | 1.3.12 | |
| maradns | maradns | 1.3.13 | |
| maradns | maradns | 1.3.14 | |
| maradns | maradns | 1.4.01 | |
| maradns | maradns | 1.4.02 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:maradns:maradns:1.3.03:*:*:*:*:*:*:*",
"matchCriteriaId": "4152EC32-1A1E-4C8E-BF22-7E610D9EE3C8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:maradns:maradns:1.3.04:*:*:*:*:*:*:*",
"matchCriteriaId": "CB9E2D75-5874-4115-B8A1-BDB363C1578D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:maradns:maradns:1.3.05:*:*:*:*:*:*:*",
"matchCriteriaId": "48DB2061-1E36-4C1B-AA12-84C143D0A270",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:maradns:maradns:1.3.06:*:*:*:*:*:*:*",
"matchCriteriaId": "EE3C6973-CDB3-45F9-BD43-0C74B231FFB8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:maradns:maradns:1.3.07.01:*:*:*:*:*:*:*",
"matchCriteriaId": "DA6C5C7B-02E6-4AC4-99A6-2D50BA66CED0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:maradns:maradns:1.3.07.02:*:*:*:*:*:*:*",
"matchCriteriaId": "05BF942C-EF7E-4320-AF8A-8BEEDDEE4D41",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:maradns:maradns:1.3.07.03:*:*:*:*:*:*:*",
"matchCriteriaId": "3D3D577E-F9DC-4616-9A6A-402C212D5A70",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:maradns:maradns:1.3.07.04:*:*:*:*:*:*:*",
"matchCriteriaId": "4DA50FF0-7BE7-4B3F-B27F-37539D4D9D4F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:maradns:maradns:1.3.07.05:*:*:*:*:*:*:*",
"matchCriteriaId": "5BF9CAA0-24E8-4D13-BABC-40BFF5B97D60",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:maradns:maradns:1.3.07.06:*:*:*:*:*:*:*",
"matchCriteriaId": "987E3CDC-C578-4850-850F-BB92F88D72B3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:maradns:maradns:1.3.07.07:*:*:*:*:*:*:*",
"matchCriteriaId": "A6464C92-02BF-4591-89B0-F7D7826E2B76",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:maradns:maradns:1.3.07.08:*:*:*:*:*:*:*",
"matchCriteriaId": "755494B1-8F52-420D-8AC8-D8DAD6D093D6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:maradns:maradns:1.3.07.09:*:*:*:*:*:*:*",
"matchCriteriaId": "BCF1FE9C-CB27-4306-B5A1-ADC4CC2BFA00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:maradns:maradns:1.3.08:*:*:*:*:*:*:*",
"matchCriteriaId": "4CA71AE3-2704-4662-8219-53C2D27EEB17",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:maradns:maradns:1.3.09:*:*:*:*:*:*:*",
"matchCriteriaId": "C1C9763D-55F2-4776-AD68-D446B62FC1CD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:maradns:maradns:1.3.10:*:*:*:*:*:*:*",
"matchCriteriaId": "349F8D05-64B6-4681-B7C0-2901348A796A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:maradns:maradns:1.3.11:*:*:*:*:*:*:*",
"matchCriteriaId": "7A88619F-859A-4FD4-9D41-FB99B5C3ABE2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:maradns:maradns:1.3.12:*:*:*:*:*:*:*",
"matchCriteriaId": "41A5E951-950C-489F-8837-FC12651C723B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:maradns:maradns:1.3.13:*:*:*:*:*:*:*",
"matchCriteriaId": "CFC05DB6-60B4-4C7E-B57F-B5CCEFD41428",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:maradns:maradns:1.3.14:*:*:*:*:*:*:*",
"matchCriteriaId": "411BC0D2-75BF-4E90-BCE4-228AB5821EA9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:maradns:maradns:1.4.01:*:*:*:*:*:*:*",
"matchCriteriaId": "9CFA46FC-7283-4877-A943-1CEBC933BF9E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:maradns:maradns:1.4.02:*:*:*:*:*:*:*",
"matchCriteriaId": "9DD92FB9-0F1D-4A8D-9F22-94CE5A2FC949",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "parse/Csv2_parse.c in MaraDNS 1.3.03, and other versions before 1.4.03, does not properly handle hostnames that do not end in a \".\" (dot) character, which allows remote attackers to cause a denial of service (NULL pointer dereference) via a crafted csv2 zone file."
},
{
"lang": "es",
"value": "parse/Csv2_parse.c en MaraDNS V1.3.03, y otras versiones anteriores v1.4.03 no maneja adecuadamente los hombres host que no terminan en el caracter \".\" (punto), lo que permite a atacantes remotos causar una denegaci\u00f3n de servicio (desreferencia de puntero nulo) a trav\u00e9s de fichero csv2 zone manipulado. \r\n"
}
],
"evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/476.html\r\n\r\n\u0027NULL Pointer Dereference\u0027",
"id": "CVE-2010-2444",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
]
},
"published": "2010-06-25T18:30:01.610",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "http://maradns.org/download/maradns-1.4.02-parse_segfault.patch"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "http://www.openwall.com/lists/oss-security/2010/06/09/4"
},
{
"source": "cve@mitre.org",
"url": "http://www.openwall.com/lists/oss-security/2010/06/24/5"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://maradns.org/download/maradns-1.4.02-parse_segfault.patch"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://www.openwall.com/lists/oss-security/2010/06/09/4"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.openwall.com/lists/oss-security/2010/06/24/5"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…