Lumension® Endpoint Intelligence Center

Intelligence Center » Browse All Vulnerabilities » CVE-2006-2077

Overview

Vulnerability Score 10.0 10.0
CVE Id CVE-2006-2077
Last Modified 05 Sep 2008 05:03:36
Published 27 Apr 2006 06:03:00
Confidentiality Impact COMPLETE COMPLETE
Integrity Impact COMPLETE COMPLETE
Availability Impact COMPLETE COMPLETE
Access Vector NETWORK
Access Complexity LOW
Authentication NONE

CVE-2006-2077

Summary

Buffer overflow in Paul Rombouts pdnsd before 1.2.4 has unknown impact and attack vectors. NOTE: this issue might be related to the OUSPG PROTOS DNS test suite.

Vulnerable Systems

Application

  • Pdnsd 1.0.13

  • Pdnsd 1.0.15

  • Pdnsd 1.1

  • Pdnsd 1.1.1

  • Pdnsd 1.1.10 Par

  • Pdnsd 1.1.11 Par

  • Pdnsd 1.1.2

  • Pdnsd 1.1.3

  • Pdnsd 1.1.4

  • Pdnsd 1.1.5

  • Pdnsd 1.1.6

  • Pdnsd 1.1.7a

  • Pdnsd 1.1.8b1 Par5

  • Pdnsd 1.1.8b1 Par6

  • Pdnsd 1.1.8b1 Par8

  • Pdnsd 1.2.1 Par

  • Pdnsd 1.2.2 Par

  • Pdnsd 1.2.3 Par


References

CERT-VN - VU#955777

CONFIRM - http://www.phys.uu.nl/~rombouts/pdnsd.html

XF - dns-improper-request-handling(26081)

BID - 17720

GENTOO - GLSA-200605-10

SECUNIA - 20055


Last Updated: 27 May 2016 10:42:19