5
CVSSv2

CVE-2006-2076

Published: 27/04/2006 Updated: 20/07/2017
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

Memory leak in Paul Rombouts pdnsd prior to 1.2.4 allows remote malicious users to cause a denial of service (memory consumption) via a DNS query with an unsupported (1) QTYPE or (2) QCLASS, as demonstrated by the OUSPG PROTOS DNS test suite.

Vulnerable Product Search on Vulmon Subscribe to Product

pdnsd pdnsd 1.1.2

pdnsd pdnsd 1.1.3

pdnsd pdnsd 1.2.1_par

pdnsd pdnsd 1.2.2_par

pdnsd pdnsd 1.0.13

pdnsd pdnsd 1.0.15

pdnsd pdnsd 1.1.4

pdnsd pdnsd 1.1.5

pdnsd pdnsd 1.1.6

pdnsd pdnsd 1.2.3_par

pdnsd pdnsd 1.1.10_par

pdnsd pdnsd 1.1.11_par

pdnsd pdnsd 1.1.8b1_par6

pdnsd pdnsd 1.1.8b1_par8

pdnsd pdnsd 1.1

pdnsd pdnsd 1.1.1

pdnsd pdnsd 1.1.7a

pdnsd pdnsd 1.1.8b1_par5

Vendor Advisories

Debian Bug report logs - #368268 pdnsd: CVE-2006-2076 and CVE-2006-2077: remote denial of service Package: pdnsd; Maintainer for pdnsd is Debian QA Group <packages@qadebianorg>; Source for pdnsd is src:pdnsd (PTS, buildd, popcon) Reported by: Alec Berryman <alec@thenednet> Date: Sat, 20 May 2006 23:48:05 UTC Seve ...