Memory leak in Paul Rombouts pdnsd prior to 1.2.4 allows remote malicious users to cause a denial of service (memory consumption) via a DNS query with an unsupported (1) QTYPE or (2) QCLASS, as demonstrated by the OUSPG PROTOS DNS test suite.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
pdnsd pdnsd 1.1.2 |
||
pdnsd pdnsd 1.1.3 |
||
pdnsd pdnsd 1.2.1_par |
||
pdnsd pdnsd 1.2.2_par |
||
pdnsd pdnsd 1.0.13 |
||
pdnsd pdnsd 1.0.15 |
||
pdnsd pdnsd 1.1.4 |
||
pdnsd pdnsd 1.1.5 |
||
pdnsd pdnsd 1.1.6 |
||
pdnsd pdnsd 1.2.3_par |
||
pdnsd pdnsd 1.1.10_par |
||
pdnsd pdnsd 1.1.11_par |
||
pdnsd pdnsd 1.1.8b1_par6 |
||
pdnsd pdnsd 1.1.8b1_par8 |
||
pdnsd pdnsd 1.1 |
||
pdnsd pdnsd 1.1.1 |
||
pdnsd pdnsd 1.1.7a |
||
pdnsd pdnsd 1.1.8b1_par5 |