Multiple implementations of the DNS protocol, including (1) Poslib 1.0.2-1 and earlier as used by Posadis, (2) Axis Network products before firmware 3.13, and (3) Men & Mice Suite 2.2x before 2.2.3 and 3.5.x before 3.5.2, allow remote attackers to cause a denial of service (CPU and network bandwidth consumption) by triggering a communications loop via (a) DNS query packets with localhost as a spoofed source address, or (b) a response packet that triggers a response packet.

Project Subscriptions

Vendors Products
2100 Network Camera Subscribe
2110 Network Camera Subscribe
2120 Network Camera Subscribe
2400 Video Server Subscribe
2401 Video Server Subscribe
2420 Network Camera Subscribe
2460 Network Dvr Subscribe
Delegate Subscribe
Delegate Subscribe
Don Moore Subscribe
Maradns Subscribe
Maradns Subscribe
Pliant Dns Server Subscribe
Posadis Subscribe
Posadis Subscribe
Wingate Subscribe
Team Johnlong Subscribe
Raidendnsd Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2004-0787 Multiple implementations of the DNS protocol, including (1) Poslib 1.0.2-1 and earlier as used by Posadis, (2) Axis Network products before firmware 3.13, and (3) Men & Mice Suite 2.2x before 2.2.3 and 3.5.x before 3.5.2, allow remote attackers to cause a denial of service (CPU and network bandwidth consumption) by triggering a communications loop via (a) DNS query packets with localhost as a spoofed source address, or (b) a response packet that triggers a response packet.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-08T00:31:46.847Z

Reserved: 2004-08-17T00:00:00

Link: CVE-2004-0789

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2004-12-31T05:00:00.000

Modified: 2025-04-03T01:03:51.193

Link: CVE-2004-0789

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses