The DNS implementation of DNRD prior to 2.10 allows remote malicious users to cause a denial of service via a compressed DNS packet with a label length byte with an incorrect offset, which could trigger an infinite loop.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
dnrd dnrd 1.4 |
||
dnrd dnrd 2.0 |
||
dnrd dnrd 2.1 |
||
dnrd dnrd 2.2 |
||
dnrd dnrd 1.0 |
||
dnrd dnrd 1.2 |
||
dnrd dnrd 2.4 |
||
dnrd dnrd 2.6 |
||
dnrd dnrd 2.7 |
||
dnrd dnrd 2.8 |
||
dnrd dnrd 2.9 |
||
dnrd dnrd 1.1 |
||
dnrd dnrd 1.3 |
||
dnrd dnrd 2.3 |
||
dnrd dnrd 2.5 |