5
CVSSv2

CVE-2008-4194

Published: 24/09/2008 Updated: 08/08/2017
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 515
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

The p_exec_query function in src/dns_query.c in pdnsd prior to 1.2.7-par allows remote malicious users to cause a denial of service (daemon crash) via a long DNS reply with many entries in the answer section, related to a "dangling pointer bug."

Vulnerable Product Search on Vulmon Subscribe to Product

pdnsd pdnsd 1.1.11-par

pdnsd pdnsd 1.1.10-par

pdnsd pdnsd 1.1.7a

pdnsd pdnsd 1.1.7

pdnsd pdnsd 1.2.5-par

pdnsd pdnsd

pdnsd pdnsd 1.1.11a-par

pdnsd pdnsd 1.1.8b1-par5

pdnsd pdnsd 1.1.8b1-par4

pdnsd pdnsd 1.2-par

pdnsd pdnsd 1.2.4-par

pdnsd pdnsd 1.1.8b1-par7

pdnsd pdnsd 1.1.8b1-par6

pdnsd pdnsd 1.2.1_par

pdnsd pdnsd 1.1.9-par

pdnsd pdnsd 1.1.8b1-par8

Vendor Advisories

Debian Bug report logs - #500910 CVE-2008-4194 denial of service Package: pdnsd; Maintainer for pdnsd is Debian QA Group <packages@qadebianorg>; Source for pdnsd is src:pdnsd (PTS, buildd, popcon) Reported by: Nico Golde <nion@debianorg> Date: Thu, 2 Oct 2008 14:21:01 UTC Severity: grave Tags: patch, security F ...

Exploits

from scapy import * import random # Copyright (C) 2008 Julien Desfossez <ju@klipixorg> # wwwsolisprojectnet/ # # This program is free software; you can redistribute it and/or modify # it under the terms of the GNU General Public License as published by # the Free Software Foundation; either version 2 of the License, or # (at your o ...
/* * Exploit for CVE-2008-1447 - Kaminsky DNS Cache Poisoning Attack * * Compilation: * $ gcc -o kaminsky-attack kaminsky-attackc `dnet-config --libs` -lm * * Dependency: libdnet (aka libdumbnet-dev under Ubuntu) * * Author: marcbevand at rapid7 dot com */ #define _BSD_SOURCE #include <sys/typesh> #include <errh> #include ...
____ ____ __ __ / \ / \ | | | | ----====####/ /\__\##/ /\ \##| |##| |####====---- | | | |__| | | | | | | | ___ | __ | | | | | ------======######\ \/ /#| |##| |#| |##| |######======------ ...