Domain Name Relay Daemon (dnrd) 2.10 and earlier allows remote malicious DNS sites to cause a denial of service and possibly execute arbitrary code via a long or malformed DNS reply, which is not handled properly by parse_query, get_objectname, and possibly other functions.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Dnrd | Dnrd | 1.0 (including) | 1.0 (including) |
Dnrd | Dnrd | 1.1 (including) | 1.1 (including) |
Dnrd | Dnrd | 1.2 (including) | 1.2 (including) |
Dnrd | Dnrd | 1.3 (including) | 1.3 (including) |
Dnrd | Dnrd | 1.4 (including) | 1.4 (including) |
Dnrd | Dnrd | 2.0 (including) | 2.0 (including) |
Dnrd | Dnrd | 2.1 (including) | 2.1 (including) |
Dnrd | Dnrd | 2.2 (including) | 2.2 (including) |
Dnrd | Dnrd | 2.3 (including) | 2.3 (including) |
Dnrd | Dnrd | 2.4 (including) | 2.4 (including) |
Dnrd | Dnrd | 2.5 (including) | 2.5 (including) |
Dnrd | Dnrd | 2.6 (including) | 2.6 (including) |
Dnrd | Dnrd | 2.7 (including) | 2.7 (including) |
Dnrd | Dnrd | 2.8 (including) | 2.8 (including) |
Dnrd | Dnrd | 2.9 (including) | 2.9 (including) |
Dnrd | Dnrd | 2.10 (including) | 2.10 (including) |