Vulnerabilities > CVE-2005-0038 - Unspecified vulnerability in Powerdns
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN powerdns
nessus
Summary
The DNS implementation of PowerDNS 2.9.16 and earlier allows remote attackers to cause a denial of service via a compressed DNS packet with a label length byte with an incorrect offset, which could trigger an infinite loop.
Vulnerable Configurations
Nessus
NASL family | DNS |
NASL id | POWERDNS_2_9_17.NASL |
description | According to its self-reported version number, the version of the PowerDNS service listening on the remote host is prior to 2.9.17. It is, therefore, affected by multiple denial of service vulnerabilities : - A denial of service vulnerability exists due to a flaw that is triggered when the server receives a compressed DNS packet with a label length byte with an incorrect offset. A remote attacker can exploit this to trigger an infinite loop, resulting in a denial of service condition. (CVE-2005-0038) - An unspecified flaw exists in the DNSPacket::expand() method in dnspacket.cc. A emote attacker can exploit flaw, by sending a random stream of bytes, to cause a denial of service condition. (CVE-2005-0428) Note that Nessus has not attempted to exploit these issues but has instead relied only on the application |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 87944 |
published | 2016-01-15 |
reporter | This script is Copyright (C) 2016-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/87944 |
title | PowerDNS < 2.9.17 Multiple DoS |
code |
|
References
- http://www.niscc.gov.uk/niscc/docs/al-20050524-00433.html
- http://www.niscc.gov.uk/niscc/docs/al-20050524-00433.html
- http://www.niscc.gov.uk/niscc/docs/re-20050524-00432.pdf?lang=en
- http://www.niscc.gov.uk/niscc/docs/re-20050524-00432.pdf?lang=en
- http://www.osvdb.org/25291
- http://www.osvdb.org/25291
- http://www.securityfocus.com/bid/13729
- http://www.securityfocus.com/bid/13729