10
CVSSv2

CVE-2006-2077

Published: 27/04/2006 Updated: 20/07/2017
CVSS v2 Base Score: 10 | Impact Score: 10 | Exploitability Score: 10
VMScore: 890
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

Buffer overflow in Paul Rombouts pdnsd prior to 1.2.4 has unknown impact and attack vectors. NOTE: this issue might be related to the OUSPG PROTOS DNS test suite.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

pdnsd pdnsd 1.1.10_par

pdnsd pdnsd 1.1.11_par

pdnsd pdnsd 1.1.8b1_par5

pdnsd pdnsd 1.1.8b1_par6

pdnsd pdnsd 1.1.8b1_par8

pdnsd pdnsd 1.1.2

pdnsd pdnsd 1.1.3

pdnsd pdnsd 1.2.1_par

pdnsd pdnsd 1.2.2_par

pdnsd pdnsd 1.1

pdnsd pdnsd 1.1.1

pdnsd pdnsd 1.1.6

pdnsd pdnsd 1.1.7a

pdnsd pdnsd 1.0.13

pdnsd pdnsd 1.0.15

pdnsd pdnsd 1.1.4

pdnsd pdnsd 1.1.5

pdnsd pdnsd 1.2.3_par

Vendor Advisories

Debian Bug report logs - #368268 pdnsd: CVE-2006-2076 and CVE-2006-2077: remote denial of service Package: pdnsd; Maintainer for pdnsd is Debian QA Group <packages@qadebianorg>; Source for pdnsd is src:pdnsd (PTS, buildd, popcon) Reported by: Alec Berryman <alec@thenednet> Date: Sat, 20 May 2006 23:48:05 UTC Seve ...