First published: Fri Mar 15 2002(Updated: )
Domain Name Relay Daemon (dnrd) 2.10 and earlier allows remote malicious DNS sites to cause a denial of service and possibly execute arbitrary code via a long or malformed DNS reply, which is not handled properly by parse_query, get_objectname, and possibly other functions.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Dnrd Dnrd | =2.5 | |
Dnrd Dnrd | =2.9 | |
Dnrd Dnrd | =2.3 | |
Dnrd Dnrd | =1.1 | |
Dnrd Dnrd | =1.3 | |
Dnrd Dnrd | =1.2 | |
Dnrd Dnrd | =2.1 | |
Dnrd Dnrd | =2.7 | |
Dnrd Dnrd | =2.6 | |
Dnrd Dnrd | =2.8 | |
Dnrd Dnrd | =1.4 | |
Dnrd Dnrd | =2.4 | |
Dnrd Dnrd | =2.2 | |
Dnrd Dnrd | =1.0 | |
Dnrd Dnrd | =2.10 | |
Dnrd Dnrd | =2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.