Vulnerability Description
MaraDNS before 1.3.07.12 and 1.4.x before 1.4.08 computes hash values for DNS data without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted queries with the Recursion Desired (RD) bit set.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Maradns | Maradns | < 1.3.07.12 |
Related Weaknesses (CWE)
References
- http://openwall.com/lists/oss-security/2012/01/03/13Mailing ListThird Party Advisory
- http://openwall.com/lists/oss-security/2012/01/03/6Mailing ListThird Party Advisory
- http://samiam.org/blog/20111229.htmlPatchThird Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=771428Issue TrackingThird Party Advisory
- http://openwall.com/lists/oss-security/2012/01/03/13Mailing ListThird Party Advisory
- http://openwall.com/lists/oss-security/2012/01/03/6Mailing ListThird Party Advisory
- http://samiam.org/blog/20111229.htmlPatchThird Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=771428Issue TrackingThird Party Advisory
FAQ
What is CVE-2012-0024?
CVE-2012-0024 is a vulnerability with a CVSS score of 7.8 (HIGH). MaraDNS before 1.3.07.12 and 1.4.x before 1.4.08 computes hash values for DNS data without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a deni...
How severe is CVE-2012-0024?
CVE-2012-0024 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2012-0024?
Check the references section above for vendor advisories and patch information. Affected products include: Maradns Maradns.