First published: Sat Dec 31 2005(Updated: )
Buffer overflow in Domain Name Relay Daemon (DNRD) before 2.19.1 allows remote attackers to execute arbitrary code via a large number of large DNS packets with the Z and QR flags cleared.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
dnrd | =1.0 | |
dnrd | =1.1 | |
dnrd | =1.2 | |
dnrd | =1.3 | |
dnrd | =1.4 | |
dnrd | =2.0 | |
dnrd | =2.1 | |
dnrd | =2.2 | |
dnrd | =2.3 | |
dnrd | =2.4 | |
dnrd | =2.5 | |
dnrd | =2.6 | |
dnrd | =2.7 | |
dnrd | =2.8 | |
dnrd | =2.9 | |
dnrd | =2.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-2315 is considered to have a high severity due to its potential to allow remote code execution.
To fix CVE-2005-2315, upgrade to a version of Domain Name Relay Daemon (DNRD) that is 2.19.1 or later.
CVE-2005-2315 affects versions of Domain Name Relay Daemon (DNRD) from 1.0 to 2.8.
Yes, CVE-2005-2315 can be exploited remotely by attackers using specially crafted DNS packets.
CVE-2005-2315 is classified as a buffer overflow vulnerability.