7.5
CVSSv2

CVE-2006-4251

Published: 14/11/2006 Updated: 20/07/2017
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Buffer overflow in PowerDNS Recursor 3.1.3 and previous versions might allow remote malicious users to execute arbitrary code via a malformed TCP DNS query that prevents Recursor from properly calculating the TCP DNS query length.

Vulnerable Product Search on Vulmon Subscribe to Product

powerdns recursor 3.0

powerdns recursor 3.0.1

powerdns recursor 2.9.15

powerdns recursor 2.9.16

powerdns recursor 3.1.2

powerdns recursor

powerdns recursor 2.0_rc1

powerdns recursor 2.8

powerdns recursor 3.1

powerdns recursor 3.1.1

powerdns recursor 2.9.17

powerdns recursor 2.9.18

Vendor Advisories

Debian Bug report logs - #398557 Security: Remote Buffer Overflow (CVE-2006-4251) Package: pdns-recursor; Maintainer for pdns-recursor is pdns-recursor packagers <pdns-recursor@packagesdebianorg>; Source for pdns-recursor is src:pdns-recursor (PTS, buildd, popcon) Reported by: "debian-bts@spamblocknetzgehirnde" <debia ...
It was discovered that malformed TCP packets may lead to denial of service and possibly the execution of arbitrary code if the PowerDNS nameserver acts as a recursive nameserver For the stable distribution (sarge) this problem has been fixed in version 2917-13sarge3 For the upcoming stable distribution (etch) this problem has been fixed in vers ...