CVE-2005-0428

The DNSPacket::expand method in dnspacket.cc in PowerDNS before 2.9.17 allows remote attackers to cause a denial of service by sending a random stream of bytes.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:powerdns:powerdns:2.0_rc1:*:*:*:*:*:*:*
cpe:2.3:a:powerdns:powerdns:2.8:*:*:*:*:*:*:*
cpe:2.3:a:powerdns:powerdns:2.9.15:*:*:*:*:*:*:*

History

20 Nov 2024, 23:55

Type Values Removed Values Added
References () http://doc.powerdns.com/changelog.html#CHANGELOG-2-9-17 - () http://doc.powerdns.com/changelog.html#CHANGELOG-2-9-17 -
References () http://ds9a.nl/cgi-bin/cvstrac/pdns/tktview?tn=21 - () http://ds9a.nl/cgi-bin/cvstrac/pdns/tktview?tn=21 -
References () http://www.gentoo.org/security/en/glsa/glsa-200502-15.xml - Patch, Vendor Advisory () http://www.gentoo.org/security/en/glsa/glsa-200502-15.xml - Patch, Vendor Advisory
References () http://www.securityfocus.com/bid/12446 - Patch, Vendor Advisory () http://www.securityfocus.com/bid/12446 - Patch, Vendor Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/19221 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/19221 -

Information

Published : 2005-05-02 04:00

Updated : 2024-11-20 23:55


NVD link : CVE-2005-0428

Mitre link : CVE-2005-0428

CVE.ORG link : CVE-2005-0428


JSON object : View

Products Affected

powerdns

  • powerdns