Multiple implementations of the DNS protocol, including (1) Poslib 1.0.2-1 and earlier as used by Posadis, (2) Axis Network products before firmware 3.13, and (3) Men & Mice Suite 2.2x before 2.2.3 and 3.5.x before 3.5.2, allow remote attackers to cause a denial of service (CPU and network bandwidth consumption) by triggering a communications loop via (a) DNS query packets with localhost as a spoofed source address, or (b) a response packet that triggers a response packet.
References
Link | Resource |
---|---|
http://www.niscc.gov.uk/niscc/docs/al-20041130-00862.html?lang=en | Vendor Advisory |
http://www.niscc.gov.uk/niscc/docs/re-20041109-00957.pdf | Vendor Advisory |
http://www.posadis.org/advisories/pos_adv_006.txt | Patch Vendor Advisory |
http://www.securityfocus.com/bid/11642 | Patch |
http://securitytracker.com/id?1012157 | Patch |
http://secunia.com/advisories/13145 | Patch |
https://exchange.xforce.ibmcloud.com/vulnerabilities/17997 |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Information
Published : 2004-12-30 21:00
Updated : 2017-07-10 18:30
NVD link : CVE-2004-0789
Mitre link : CVE-2004-0789
JSON object : View
CWE
Products Affected
posadis
- posadis
axis
- 2120_network_camera
- 2100_network_camera
- 2420_network_camera
- 2110_network_camera
- 2401_video_server
- 2400_video_server
- 2460_network_dvr
maradns
- maradns
dnrd
- dnrd
qbik
- wingate
team_johnlong
- raidendnsd
delegate
- delegate
pliant
- pliant_dns_server
don_moore
- mydns