CVE-2006-2076
Published Apr 27, 2006
Last updated 7 years ago
Overview
- Description
- Memory leak in Paul Rombouts pdnsd before 1.2.4 allows remote attackers to cause a denial of service (memory consumption) via a DNS query with an unsupported (1) QTYPE or (2) QCLASS, as demonstrated by the OUSPG PROTOS DNS test suite.
- Source
- cve@mitre.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 5
- Impact score
- 2.9
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:N/I:N/A:P
Weaknesses
- nvd@nist.gov
- NVD-CWE-Other
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:pdnsd:pdnsd:1.0.13:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "25CA7CEF-0542-449A-B3A8-B82848A6CD3B" }, { "criteria": "cpe:2.3:a:pdnsd:pdnsd:1.0.15:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D9DEBAFA-77D8-4FCC-9514-79318F951EC8" }, { "criteria": "cpe:2.3:a:pdnsd:pdnsd:1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "99963775-9ADD-4135-BE83-EC3C2ECF7791" }, { "criteria": "cpe:2.3:a:pdnsd:pdnsd:1.1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1E40E6EE-77F1-48A3-B86B-24676E076EA7" }, { "criteria": "cpe:2.3:a:pdnsd:pdnsd:1.1.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F615F9A7-A638-4B62-9E95-F964F562B020" }, { "criteria": "cpe:2.3:a:pdnsd:pdnsd:1.1.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D188D6A9-F740-4ECA-B9DC-FFBD62D56175" }, { "criteria": "cpe:2.3:a:pdnsd:pdnsd:1.1.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8C4D68F2-3C70-475E-B7C5-C992509945B1" }, { "criteria": "cpe:2.3:a:pdnsd:pdnsd:1.1.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F95A9845-7B28-4159-940C-FB8A2C2F67B8" }, { "criteria": "cpe:2.3:a:pdnsd:pdnsd:1.1.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FC022BE8-0949-4401-85EB-5A889CDD9612" }, { "criteria": "cpe:2.3:a:pdnsd:pdnsd:1.1.7a:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1848A537-D8B7-4C56-980B-B19237603A21" }, { "criteria": "cpe:2.3:a:pdnsd:pdnsd:1.1.8b1_par5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "07127D33-E813-413C-A9B6-61018880A071" }, { "criteria": "cpe:2.3:a:pdnsd:pdnsd:1.1.8b1_par6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2A94AAB8-1FBA-4762-AA6E-55ECC8284A44" }, { "criteria": "cpe:2.3:a:pdnsd:pdnsd:1.1.8b1_par8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E49C9040-4A00-4CD0-9357-0649295DEF18" }, { "criteria": "cpe:2.3:a:pdnsd:pdnsd:1.1.10_par:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D8C6254C-3583-44DB-AAF5-37CAE8E97B15" }, { "criteria": "cpe:2.3:a:pdnsd:pdnsd:1.1.11_par:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DB981DF6-B6E4-46E5-B81F-2A9AEE8780EF" }, { "criteria": "cpe:2.3:a:pdnsd:pdnsd:1.2.1_par:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DF7A894A-4CE6-415E-8601-F495D8DBEE0F" }, { "criteria": "cpe:2.3:a:pdnsd:pdnsd:1.2.2_par:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3E4019AD-FD86-41ED-AF5A-C170A64D6231" }, { "criteria": "cpe:2.3:a:pdnsd:pdnsd:1.2.3_par:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C73271DE-40DF-4D27-9A7F-4C81177B1707" } ], "operator": "OR" } ] } ]