Vulnerability Description
The DNSPacket::expand method in dnspacket.cc in PowerDNS before 2.9.17 allows remote attackers to cause a denial of service by sending a random stream of bytes.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Powerdns | Powerdns | 2.0_rc1 |
References
- http://doc.powerdns.com/changelog.html#CHANGELOG-2-9-17
- http://ds9a.nl/cgi-bin/cvstrac/pdns/tktview?tn=21
- http://www.gentoo.org/security/en/glsa/glsa-200502-15.xmlPatchVendor Advisory
- http://www.securityfocus.com/bid/12446PatchVendor Advisory
- https://exchange.xforce.ibmcloud.com/vulnerabilities/19221
- http://doc.powerdns.com/changelog.html#CHANGELOG-2-9-17
- http://ds9a.nl/cgi-bin/cvstrac/pdns/tktview?tn=21
- http://www.gentoo.org/security/en/glsa/glsa-200502-15.xmlPatchVendor Advisory
- http://www.securityfocus.com/bid/12446PatchVendor Advisory
- https://exchange.xforce.ibmcloud.com/vulnerabilities/19221
FAQ
What is CVE-2005-0428?
CVE-2005-0428 is a vulnerability with a CVSS score of 5.0 (MEDIUM). The DNSPacket::expand method in dnspacket.cc in PowerDNS before 2.9.17 allows remote attackers to cause a denial of service by sending a random stream of bytes.
How severe is CVE-2005-0428?
CVE-2005-0428 has been rated MEDIUM with a CVSS base score of 5.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2005-0428?
Check the references section above for vendor advisories and patch information. Affected products include: Powerdns Powerdns.