First published: Sat Dec 31 2005(Updated: )
The DNS implementation of DNRD before 2.10 allows remote attackers to cause a denial of service via a compressed DNS packet with a label length byte with an incorrect offset, which could trigger an infinite loop.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
dnrd | =1.0 | |
dnrd | =1.1 | |
dnrd | =1.2 | |
dnrd | =1.3 | |
dnrd | =1.4 | |
dnrd | =2.0 | |
dnrd | =2.1 | |
dnrd | =2.2 | |
dnrd | =2.3 | |
dnrd | =2.4 | |
dnrd | =2.5 | |
dnrd | =2.6 | |
dnrd | =2.7 | |
dnrd | =2.8 | |
dnrd | =2.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-0037 has a severity level that can lead to a denial of service due to an infinite loop caused by malformed DNS packets.
CVE-2005-0037 affects DNRD versions 1.0 through 2.9.
To fix CVE-2005-0037, upgrade to a patched version of DNRD that is above 2.9.
The impact of CVE-2005-0037 includes potential denial of service attacks against systems running vulnerable versions of DNRD.
Yes, CVE-2005-0037 is exploitable remotely through specially crafted compressed DNS packets.