First published: Fri Mar 15 2002(Updated: )
Domain Name Relay Daemon (dnrd) 2.10 and earlier allows remote malicious DNS sites to cause a denial of service and possibly execute arbitrary code via a long or malformed DNS reply, which is not handled properly by parse_query, get_objectname, and possibly other functions.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
dnrd | =2.5 | |
dnrd | =2.9 | |
dnrd | =2.3 | |
dnrd | =1.1 | |
dnrd | =1.3 | |
dnrd | =1.2 | |
dnrd | =2.1 | |
dnrd | =2.7 | |
dnrd | =2.6 | |
dnrd | =2.8 | |
dnrd | =1.4 | |
dnrd | =2.4 | |
dnrd | =2.2 | |
dnrd | =1.0 | |
dnrd | =2.10 | |
dnrd | =2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2002-0140 has a medium severity rating due to its potential for denial of service and arbitrary code execution.
To fix CVE-2002-0140, you should upgrade to a version of Domain Name Relay Daemon (dnrd) that is later than 2.10.
CVE-2002-0140 affects specific versions of Domain Name Relay Daemon (dnrd) including 1.0 through 2.10.
CVE-2002-0140 involves an attack vector that exploits malformed DNS replies to cause denial of service.
While CVE-2002-0140 is older, systems still running affected dnrd versions could be at risk if not updated.