Description
Multiple implementations of the DNS protocol, including (1) Poslib 1.0.2-1 and earlier as used by Posadis, (2) Axis Network products before firmware 3.13, and (3) Men & Mice Suite 2.2x before 2.2.3 and 3.5.x before 3.5.2, allow remote attackers to cause a denial of service (CPU and network bandwidth consumption) by triggering a communications loop via (a) DNS query packets with localhost as a spoofed source address, or (b) a response packet that triggers a response packet.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2004-0787 | Multiple implementations of the DNS protocol, including (1) Poslib 1.0.2-1 and earlier as used by Posadis, (2) Axis Network products before firmware 3.13, and (3) Men & Mice Suite 2.2x before 2.2.3 and 3.5.x before 3.5.2, allow remote attackers to cause a denial of service (CPU and network bandwidth consumption) by triggering a communications loop via (a) DNS query packets with localhost as a spoofed source address, or (b) a response packet that triggers a response packet. |
References
History
No history.
Subscriptions
Axis
Subscribe
2100 Network Camera
Subscribe
2110 Network Camera
Subscribe
2120 Network Camera
Subscribe
2400 Video Server
Subscribe
2401 Video Server
Subscribe
2420 Network Camera
Subscribe
2460 Network Dvr
Subscribe
Delegate
Subscribe
Delegate
Subscribe
Dnrd
Subscribe
Dnrd
Subscribe
Don Moore
Subscribe
Mydns
Subscribe
Maradns
Subscribe
Maradns
Subscribe
Pliant
Subscribe
Pliant Dns Server
Subscribe
Posadis
Subscribe
Posadis
Subscribe
Qbik
Subscribe
Wingate
Subscribe
Team Johnlong
Subscribe
Raidendnsd
Subscribe
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-08T00:31:46.847Z
Reserved: 2004-08-17T00:00:00.000Z
Link: CVE-2004-0789
No data.
Status : Deferred
Published: 2004-12-31T05:00:00.000
Modified: 2025-04-03T01:03:51.193
Link: CVE-2004-0789
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD