Lumension® Endpoint Intelligence Center

Intelligence Center » Browse All Vulnerabilities » CVE-2006-2076

Overview

Vulnerability Score 5.0 5.0
CVE Id CVE-2006-2076
Last Modified 07 Mar 2011 09:35:11
Published 27 Apr 2006 06:03:00
Confidentiality Impact NONE NONE
Integrity Impact NONE NONE
Availability Impact PARTIAL PARTIAL
Access Vector NETWORK
Access Complexity LOW
Authentication NONE

CVE-2006-2076

Summary

Memory leak in Paul Rombouts pdnsd before 1.2.4 allows remote attackers to cause a denial of service (memory consumption) via a DNS query with an unsupported (1) QTYPE or (2) QCLASS, as demonstrated by the OUSPG PROTOS DNS test suite.

Vulnerable Systems

Application

  • Pdnsd 1.0.13

  • Pdnsd 1.0.15

  • Pdnsd 1.1

  • Pdnsd 1.1.1

  • Pdnsd 1.1.10 Par

  • Pdnsd 1.1.11 Par

  • Pdnsd 1.1.2

  • Pdnsd 1.1.3

  • Pdnsd 1.1.4

  • Pdnsd 1.1.5

  • Pdnsd 1.1.6

  • Pdnsd 1.1.7a

  • Pdnsd 1.1.8b1 Par5

  • Pdnsd 1.1.8b1 Par6

  • Pdnsd 1.1.8b1 Par8

  • Pdnsd 1.2.1 Par

  • Pdnsd 1.2.2 Par

  • Pdnsd 1.2.3 Par


References

CERT-VN - VU#955777

BID - 17694

SECTRACK - 1015989

VUPEN - ADV-2006-1528

VUPEN - ADV-2006-1505

CONFIRM - http://www.phys.uu.nl/~rombouts/pdnsd.html

MISC - http://www.niscc.gov.uk/niscc/docs/re-20060425-00312.pdf?lang=en

MISC - http://www.niscc.gov.uk/niscc/docs/br-20060425-00311.html?lang=en

XF - dns-improper-request-handling(26081)

GENTOO - GLSA-200605-10

SECUNIA - 20055

SECUNIA - 19835


Last Updated: 27 May 2016 10:42:19