First published: Sat Dec 31 2005(Updated: )
Domain Name Relay Daemon (DNRD) before 2.19.1 allows remote attackers to cause a denial of service (infinite recursion) via a DNS packet that uses message compression in the QNAME and two pointers that point to each other (circular buffer).
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
dnrd | =2.18 | |
dnrd | =2.5 | |
dnrd | =2.14.1 | |
dnrd | =2.17.1 | |
dnrd | =2.11 | |
dnrd | =2.14 | |
dnrd | =2.9 | |
dnrd | =2.17.2 | |
dnrd | =2.12 | |
dnrd | =2.3 | |
dnrd | =2.15 | |
dnrd | =2.1 | |
dnrd | =2.7 | |
dnrd | =2.6 | |
dnrd | =2.16.1 | |
dnrd | =2.8 | |
dnrd | =2.19 | |
dnrd | =2.4 | |
dnrd | =2.12.1 | |
dnrd | =2.2 | |
dnrd | =2.10 | |
dnrd | =2.13 | |
dnrd | =2.16 | |
dnrd | =2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-2316 has a severity rating that indicates it can lead to a denial of service through infinite recursion.
To fix CVE-2005-2316, upgrade to Domain Name Relay Daemon version 2.19.1 or later.
CVE-2005-2316 affects multiple versions of Domain Name Relay Daemon, specifically versions before 2.19.1.
CVE-2005-2316 exploits a vulnerability in DNS packet handling that allows for remote denial of service.
Yes, CVE-2005-2316 can be exploited easily by sending specially crafted DNS packets.