Multiple implementations of the DNS protocol, including (1) Poslib 1.0.2-1 and earlier as used by Posadis, (2) Axis Network products before firmware 3.13, and (3) Men & Mice Suite 2.2x before 2.2.3 and 3.5.x before 3.5.2, allow remote attackers to cause a denial of service (CPU and network bandwidth consumption) by triggering a communications loop via (a) DNS query packets with localhost as a spoofed source address, or (b) a response packet that triggers a response packet.
References
Link | Resource |
---|---|
http://secunia.com/advisories/13145 | Patch |
http://securitytracker.com/id?1012157 | Patch |
http://www.niscc.gov.uk/niscc/docs/al-20041130-00862.html?lang=en | Vendor Advisory |
http://www.niscc.gov.uk/niscc/docs/re-20041109-00957.pdf | Vendor Advisory |
http://www.posadis.org/advisories/pos_adv_006.txt | Patch Vendor Advisory |
http://www.securityfocus.com/bid/11642 | Patch |
https://exchange.xforce.ibmcloud.com/vulnerabilities/17997 |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
No history.
Information
Published : 2004-12-31 05:00
Updated : 2024-02-04 16:31
NVD link : CVE-2004-0789
Mitre link : CVE-2004-0789
CVE.ORG link : CVE-2004-0789
JSON object : View
Products Affected
pliant
- pliant_dns_server
axis
- 2401_video_server
- 2100_network_camera
- 2400_video_server
- 2110_network_camera
- 2460_network_dvr
- 2420_network_camera
- 2120_network_camera
posadis
- posadis
don_moore
- mydns
delegate
- delegate
qbik
- wingate
team_johnlong
- raidendnsd
dnrd
- dnrd
maradns
- maradns
CWE