First published: Tue Jan 03 2012(Updated: )
MaraDNS suffers from an error with the hash generation function which can be exploited to cause a hash collision resulting in high CPU consumption (Denial of Service). This flaw has been corrected in versions 1.3.07.13 and 1.4.09. References: <a href="http://samiam.org/blog/20111229.html">http://samiam.org/blog/20111229.html</a> <a href="http://samiam.org/blog/20111230.html">http://samiam.org/blog/20111230.html</a> No CVE has been assigned as of yet.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/maradns | <1.3.07.13 | 1.3.07.13 |
redhat/maradns | <1.4.09 | 1.4.09 |
MaraDNS | <=2.0.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-5056 is classified as a Denial of Service vulnerability due to high CPU consumption from hash collisions.
To fix CVE-2011-5056, upgrade to MaraDNS version 1.3.07.13 or 1.4.09.
CVE-2011-5056 affects MaraDNS versions prior to 1.3.07.13 and 1.4.09.
CVE-2011-5056 facilitates Denial of Service attacks via hash collision exploitation.
CVE-2011-5056 is related to MaraDNS packages available on Red Hat systems.