Vulnerability Description
Memory leak in Paul Rombouts pdnsd before 1.2.4 allows remote attackers to cause a denial of service (memory consumption) via a DNS query with an unsupported (1) QTYPE or (2) QCLASS, as demonstrated by the OUSPG PROTOS DNS test suite.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Pdnsd | Pdnsd | 1.0.13 |
References
- http://secunia.com/advisories/19835
- http://secunia.com/advisories/20055
- http://securitytracker.com/id?1015989Patch
- http://www.gentoo.org/security/en/glsa/glsa-200605-10.xml
- http://www.kb.cert.org/vuls/id/955777US Government Resource
- http://www.niscc.gov.uk/niscc/docs/br-20060425-00311.html?lang=enVendor Advisory
- http://www.niscc.gov.uk/niscc/docs/re-20060425-00312.pdf?lang=enVendor Advisory
- http://www.phys.uu.nl/~rombouts/pdnsd.html
- http://www.securityfocus.com/bid/17694Patch
- http://www.vupen.com/english/advisories/2006/1505
- http://www.vupen.com/english/advisories/2006/1528
- https://exchange.xforce.ibmcloud.com/vulnerabilities/26081
- http://secunia.com/advisories/19835
- http://secunia.com/advisories/20055
- http://securitytracker.com/id?1015989Patch
FAQ
What is CVE-2006-2076?
CVE-2006-2076 is a vulnerability with a CVSS score of 5.0 (MEDIUM). Memory leak in Paul Rombouts pdnsd before 1.2.4 allows remote attackers to cause a denial of service (memory consumption) via a DNS query with an unsupported (1) QTYPE or (2) QCLASS, as demonstrated b...
How severe is CVE-2006-2076?
CVE-2006-2076 has been rated MEDIUM with a CVSS base score of 5.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2006-2076?
Check the references section above for vendor advisories and patch information. Affected products include: Pdnsd Pdnsd.