CERTA-2005-AVI-181

Vulnerability from certfr_avis - Published: 2005-05-27 - Updated: 2005-05-27

None

Description

Une mauvaise gestion de la décompression des messages DNS peut conduire à l'épuisement des ressources disponibles pour le serveur et entraîner un déni de service.

Solution

Se référer aux sites des constructeurs pour l'obtention du correctif (cf. Documentation).

None
Impacted products
Vendor Product Description
N/A N/A Cache DNS DNRD en version antérieure à la 2.18 ;
N/A N/A Serveur DNS PowerDNS jusqu'à la version 2.9.16 ;
Cisco N/A Plusieurs équipements Cisco (voir avis CERTA-2005-AVI-175).
N/A N/A Serveur mandataire (« proxy ») cache Delegate jusqu'à la version 8.10.2 ;

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Cache DNS DNRD en version ant\u00e9rieure \u00e0 la 2.18 ;",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "N/A",
          "scada": false
        }
      }
    },
    {
      "description": "Serveur DNS PowerDNS jusqu\u0027\u00e0 la version 2.9.16 ;",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "N/A",
          "scada": false
        }
      }
    },
    {
      "description": "Plusieurs \u00e9quipements Cisco (voir avis CERTA-2005-AVI-175).",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Cisco",
          "scada": false
        }
      }
    },
    {
      "description": "Serveur mandataire (\u00ab proxy \u00bb) cache Delegate jusqu\u0027\u00e0 la version 8.10.2 ;",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "N/A",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Description\n\nUne mauvaise gestion de la d\u00e9compression des messages DNS peut conduire\n\u00e0 l\u0027\u00e9puisement des ressources disponibles pour le serveur et entra\u00eener\nun d\u00e9ni de service.\n\n## Solution\n\nSe r\u00e9f\u00e9rer aux sites des constructeurs pour l\u0027obtention du correctif\n(cf. Documentation).\n",
  "cves": [],
  "initial_release_date": "2005-05-27T00:00:00",
  "last_revision_date": "2005-05-27T00:00:00",
  "links": [
    {
      "title": "Bulletin de s\u00e9curit\u00e9 589088 du NISCC :",
      "url": "http://www.niscc.gov.uk/niscc/docs/re-20050524-00432.pdf"
    },
    {
      "title": "Site de DNRD :",
      "url": "http://dnrd.sourceforge.net/"
    },
    {
      "title": "Avis \"Vuln\u00e9rabilit\u00e9 du DNS de plusieurs produits Cisco\" du    25 mai 2005 :",
      "url": "http://www.certa.ssi.gouv.fr/site/CERTA-2005-AVI-175/index.html"
    },
    {
      "title": "Site de PowerDNS :",
      "url": "http://www.powerdns.com"
    },
    {
      "title": "Site de delegate :",
      "url": "http://www.delegate.org"
    }
  ],
  "reference": "CERTA-2005-AVI-181",
  "revisions": [
    {
      "description": "version initiale.",
      "revision_date": "2005-05-27T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service"
    }
  ],
  "summary": null,
  "title": "Mauvais support du protocole DNS",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Avis de s\u00e9curit\u00e9 589088 du NISCC",
      "url": null
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…