Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2005-0038


The DNS implementation of PowerDNS 2.9.16 and earlier allows remote attackers to cause a denial of service via a compressed DNS packet with a label length byte with an incorrect offset, which could trigger an infinite loop.


Published

2005-12-31T05:00:00.000

Last Modified

2025-04-03T01:03:51.193

Status

Deferred

Source

[email protected]

Severity

CVSSv2: 5.0 (MEDIUM)

CVSSv2 Vector

AV:N/AC:L/Au:N/C:N/I:N/A:P

  • Access Vector: NETWORK
  • Access Complexity: LOW
  • Authentication: NONE
  • Confidentiality Impact: NONE
  • Integrity Impact: NONE
  • Availability Impact: PARTIAL
Exploitability Score

10.0

Impact Score

2.9

Weaknesses
  • Type: Primary
    NVD-CWE-Other

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application powerdns powerdns ≤ 2.9.16 Yes
Application powerdns powerdns 2.0_rc1 Yes
Application powerdns powerdns 2.8 Yes
Application powerdns powerdns 2.9.0 Yes
Application powerdns powerdns 2.9.1 Yes
Application powerdns powerdns 2.9.2 Yes
Application powerdns powerdns 2.9.3a Yes
Application powerdns powerdns 2.9.4 Yes
Application powerdns powerdns 2.9.5 Yes
Application powerdns powerdns 2.9.6 Yes
Application powerdns powerdns 2.9.7 Yes
Application powerdns powerdns 2.9.8 Yes
Application powerdns powerdns 2.9.10 Yes
Application powerdns powerdns 2.9.11 Yes
Application powerdns powerdns 2.9.12 Yes
Application powerdns powerdns 2.9.13 Yes
Application powerdns powerdns 2.9.14 Yes
Application powerdns powerdns 2.9.15 Yes

References