First published: Fri Dec 31 2004(Updated: )
Multiple implementations of the DNS protocol, including (1) Poslib 1.0.2-1 and earlier as used by Posadis, (2) Axis Network products before firmware 3.13, and (3) Men & Mice Suite 2.2x before 2.2.3 and 3.5.x before 3.5.2, allow remote attackers to cause a denial of service (CPU and network bandwidth consumption) by triggering a communications loop via (a) DNS query packets with localhost as a spoofed source address, or (b) a response packet that triggers a response packet.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Delegate | =8.9.2 | |
Qbik WinGate | =6.0.1_build_993 | |
Delegate | =8.3.3 | |
dnrd | =2.5 | |
Posadis Posadis | =0.50.4 | |
Posadis Posadis | =0.60.0 | |
MaraDNS | =0.8.05 | |
myDNS | =0.7 | |
MaraDNS | =0.5.30 | |
Delegate | =8.4.0 | |
Delegate | =7.8.0 | |
Qbik WinGate | =6.0 | |
dnrd | =2.9 | |
Delegate | =8.3.4 | |
dnrd | =2.3 | |
dnrd | =1.1 | |
Posadis Posadis | =0.50.7 | |
pliant DNS server | ||
Qbik WinGate | =6.0.1_build_995 | |
MaraDNS | =0.5.29 | |
Delegate | =8.5.0 | |
Posadis Posadis | =0.50.6 | |
Delegate | =7.8.1 | |
Delegate | =8.9.1 | |
dnrd | =1.3 | |
RaidenFTPD | ||
dnrd | =1.2 | |
myDNS | =0.10.0 | |
dnrd | =2.1 | |
Posadis Posadis | =m5pre2 | |
dnrd | =2.7 | |
Posadis Posadis | =m5pre1 | |
dnrd | =2.6 | |
ETL Delegate | =7.9.11 | |
ETL Delegate | =7.7.1 | |
dnrd | =2.8 | |
myDNS | =0.8 | |
ETL Delegate | =7.7.0 | |
dnrd | =1.4 | |
ETL Delegate | =8.9.4 | |
ETL Delegate | =8.9.5 | |
Qbik WinGate | =4.0.1 | |
dnrd | =2.4 | |
MaraDNS | =0.5.31 | |
dnrd | =2.2 | |
Qbik WinGate | =3.0 | |
Posadis Posadis | =0.50.8 | |
Qbik WinGate | =4.1_beta_a | |
ETL Delegate | =8.9 | |
dnrd | =1.0 | |
ETL Delegate | =7.8.2 | |
myDNS | =0.9 | |
dnrd | =2.10 | |
Posadis Posadis | =0.50.5 | |
ETL Delegate | =8.9.3 | |
Posadis Posadis | =0.50.9 | |
Posadis Posadis | =0.60.1 | |
dnrd | =2.0 | |
myDNS | =0.6 | |
MaraDNS | =0.5.28 | |
Axis 2120 Network Camera | =2.31 | |
Axis 2110 Network Camera | =2.32 | |
AXIS 2100 Network Camera | =2.12 | |
AXIS 2100 Network Camera | =2.01 | |
AXIS 2100 Network Camera | =2.41 | |
Axis 2120 Network Camera | =2.32 | |
AXIS 2400 Video Server | =3.12 | |
Axis 2110 Network Camera | =2.41 | |
AXIS 2100 Network Camera | =2.03 | |
AXIS 2420-IR Network Camera | =2.33 | |
AXIS 2420-IR Network Camera | =2.12 | |
Axis 2120 Network Camera | =2.34 | |
AXIS 2100 Network Camera | =2.31 | |
Axis 2110 Network Camera | =2.12 | |
Axis 2120 Network Camera | =2.30 | |
AXIS 2420-IR Network Camera | =2.30 | |
Axis 2120 Network Camera | =2.12 | |
AXIS 2100 Network Camera | =2.30 | |
AXIS 2420-IR Network Camera | =2.32 | |
Axis 2110 Network Camera | =2.34 | |
Axis 2120 Network Camera | =2.41 | |
AXIS 2420-IR Network Camera | =2.40 | |
Axis 2120 Network Camera | =2.40 | |
AXIS 2100 Network Camera | =2.33 | |
Axis 2110 Network Camera | =2.30 | |
Axis 2110 Network Camera | =2.31 | |
Axis 2460 Network DVR | =3.12 | |
Axis 2401 Video Server | =3.12 | |
AXIS 2420-IR Network Camera | =2.41 | |
AXIS 2100 Network Camera | =2.0 | |
AXIS 2100 Network Camera | =2.40 | |
AXIS 2100 Network Camera | =2.32 | |
Axis 2110 Network Camera | =2.40 | |
AXIS 2400 Video Server | =3.11 | |
AXIS 2100 Network Camera | =2.02 | |
AXIS 2100 Network Camera | =2.34 | |
AXIS 2420-IR Network Camera | =2.31 | |
AXIS 2420-IR Network Camera | =2.34 | |
Delegate | =7.7.0 | |
Delegate | =7.7.1 | |
Delegate | =7.8.2 | |
Delegate | =7.9.11 | |
Delegate | =8.9 | |
Delegate | =8.9.3 | |
Delegate | =8.9.4 | |
Delegate | =8.9.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2004-0789 is classified as a high severity vulnerability due to its potential to cause denial of service.
To fix CVE-2004-0789, you should update the affected DNS implementations to their latest versions that have patched this vulnerability.
CVE-2004-0789 affects multiple DNS implementations, including Poslib, Axis Network products, and Men & Mice Suite, among others.
Remote attackers can exploit CVE-2004-0789 to disrupt DNS services, resulting in denial of service conditions.
Exploitation of CVE-2004-0789 may lead to high CPU usage and significant network bandwidth consumption, making services unavailable.