CVE-2005-2315

Buffer overflow in Domain Name Relay Daemon (DNRD) before 2.19.1 allows remote attackers to execute arbitrary code via a large number of large DNS packets with the Z and QR flags cleared.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:dnrd:dnrd:1.0:*:*:*:*:*:*:*
cpe:2.3:a:dnrd:dnrd:1.1:*:*:*:*:*:*:*
cpe:2.3:a:dnrd:dnrd:1.2:*:*:*:*:*:*:*
cpe:2.3:a:dnrd:dnrd:1.3:*:*:*:*:*:*:*
cpe:2.3:a:dnrd:dnrd:1.4:*:*:*:*:*:*:*
cpe:2.3:a:dnrd:dnrd:2.0:*:*:*:*:*:*:*
cpe:2.3:a:dnrd:dnrd:2.1:*:*:*:*:*:*:*
cpe:2.3:a:dnrd:dnrd:2.2:*:*:*:*:*:*:*
cpe:2.3:a:dnrd:dnrd:2.3:*:*:*:*:*:*:*
cpe:2.3:a:dnrd:dnrd:2.4:*:*:*:*:*:*:*
cpe:2.3:a:dnrd:dnrd:2.5:*:*:*:*:*:*:*
cpe:2.3:a:dnrd:dnrd:2.6:*:*:*:*:*:*:*
cpe:2.3:a:dnrd:dnrd:2.7:*:*:*:*:*:*:*
cpe:2.3:a:dnrd:dnrd:2.8:*:*:*:*:*:*:*
cpe:2.3:a:dnrd:dnrd:2.9:*:*:*:*:*:*:*
cpe:2.3:a:dnrd:dnrd:2.10:*:*:*:*:*:*:*

History

20 Nov 2024, 23:59

Type Values Removed Values Added
References () http://secunia.com/advisories/16142 - Patch, Vendor Advisory () http://secunia.com/advisories/16142 - Patch, Vendor Advisory
References () http://securitytracker.com/id?1014557 - Exploit () http://securitytracker.com/id?1014557 - Exploit
References () http://sourceforge.net/forum/forum.php?forum_id=482568 - Patch () http://sourceforge.net/forum/forum.php?forum_id=482568 - Patch
References () http://www.FreeBSD.org/ports/portaudit/e72fd82b-fa01-11d9-bc08-0001020eed82.html - () http://www.FreeBSD.org/ports/portaudit/e72fd82b-fa01-11d9-bc08-0001020eed82.html -

Information

Published : 2005-12-31 05:00

Updated : 2024-11-20 23:59


NVD link : CVE-2005-2315

Mitre link : CVE-2005-2315

CVE.ORG link : CVE-2005-2315


JSON object : View

Products Affected

dnrd

  • dnrd