First published: Tue Feb 15 2005(Updated: )
The DNSPacket::expand method in dnspacket.cc in PowerDNS before 2.9.17 allows remote attackers to cause a denial of service by sending a random stream of bytes.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
PowerDNS DNSDist | =2.0_rc1 | |
PowerDNS DNSDist | =2.8 | |
PowerDNS DNSDist | =2.9.15 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-0428 is classified as a denial of service vulnerability that can impact system availability.
To mitigate CVE-2005-0428, upgrade PowerDNS to version 2.9.17 or later.
CVE-2005-0428 affects PowerDNS versions 2.0_rc1, 2.8, and 2.9.15.
Yes, CVE-2005-0428 can be exploited remotely by sending a random stream of bytes to the affected service.
The vulnerability in CVE-2005-0428 exists in the DNSPacket::expand method of dnspacket.cc.