CVE-2012-2978
Published Jul 27, 2012
Last updated 7 years ago
Overview
- Description
- query.c in NSD 3.0.x through 3.0.8, 3.1.x through 3.1.1, and 3.2.x before 3.2.12 allows remote attackers to cause a denial of service (NULL pointer dereference and child process crash) via a crafted DNS packet.
- Source
- cret@cert.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 5
- Impact score
- 2.9
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:N/I:N/A:P
Weaknesses
- nvd@nist.gov
- CWE-119
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:nlnetlabs:nsd:3.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8E347F8C-AB1F-4967-9C85-055214798ECE" }, { "criteria": "cpe:2.3:a:nlnetlabs:nsd:3.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3DEDA235-5B80-4816-86C5-C83A45878A3E" }, { "criteria": "cpe:2.3:a:nlnetlabs:nsd:3.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "22BC2EBF-9241-4FE1-A730-9F9BB6E2777C" }, { "criteria": "cpe:2.3:a:nlnetlabs:nsd:3.0.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3180CAA2-1518-4750-98DE-F64821297034" }, { "criteria": "cpe:2.3:a:nlnetlabs:nsd:3.0.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "56BCFAEA-AC1F-4D3E-B473-A6081D423BEB" }, { "criteria": "cpe:2.3:a:nlnetlabs:nsd:3.0.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CEA25A60-DD5F-4FE8-A6CC-1695232E3D95" }, { "criteria": "cpe:2.3:a:nlnetlabs:nsd:3.0.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C326A66B-457E-4130-A214-ED265576F448" }, { "criteria": "cpe:2.3:a:nlnetlabs:nsd:3.0.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "140464BA-39D7-4B63-92F9-9D6E09CFF6DE" }, { "criteria": "cpe:2.3:a:nlnetlabs:nsd:3.0.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E86C924A-6CD8-4D9A-8CFC-E4AD4CC9331E" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:nlnetlabs:nsd:3.1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A818B06C-8798-460D-AE5A-93162CB758A0" }, { "criteria": "cpe:2.3:a:nlnetlabs:nsd:3.1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3755E217-23CB-42EF-90E8-020D5796226B" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:nlnetlabs:nsd:3.2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F341E55C-DB91-4D7B-91AE-076525C52A1F" }, { "criteria": "cpe:2.3:a:nlnetlabs:nsd:3.2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "760CF611-A8BF-4E96-9F21-0796FBC8A521" }, { "criteria": "cpe:2.3:a:nlnetlabs:nsd:3.2.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E5A52D5D-F34E-4148-A1B5-41668CAF4370" }, { "criteria": "cpe:2.3:a:nlnetlabs:nsd:3.2.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BC6AED26-55BB-449E-815E-532C0DD24B26" }, { "criteria": "cpe:2.3:a:nlnetlabs:nsd:3.2.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "608E8EA7-9875-42E7-B8A4-9CE5EAE1B403" }, { "criteria": "cpe:2.3:a:nlnetlabs:nsd:3.2.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EE30D876-F03D-4BAA-BC1B-BEF22CD159E0" }, { "criteria": "cpe:2.3:a:nlnetlabs:nsd:3.2.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4FC27746-21C8-4949-A099-7BFCBB21A368" }, { "criteria": "cpe:2.3:a:nlnetlabs:nsd:3.2.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "39D5DB56-E99F-4B2D-815D-D697ACB352FE" }, { "criteria": "cpe:2.3:a:nlnetlabs:nsd:3.2.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0C3BFA93-297D-4EFB-AF7E-0C451B47C23B" }, { "criteria": "cpe:2.3:a:nlnetlabs:nsd:3.2.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6B605C0B-213F-4626-A30C-D13C0D4635D8" } ], "operator": "OR" } ] } ]