The DNS implementation of DNRD before 2.10 allows remote attackers to cause a denial of service via a compressed DNS packet with a label length byte with an incorrect offset, which could trigger an infinite loop.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Dnrd | Dnrd | 1.0 (including) | 1.0 (including) |
Dnrd | Dnrd | 1.1 (including) | 1.1 (including) |
Dnrd | Dnrd | 1.2 (including) | 1.2 (including) |
Dnrd | Dnrd | 1.3 (including) | 1.3 (including) |
Dnrd | Dnrd | 1.4 (including) | 1.4 (including) |
Dnrd | Dnrd | 2.0 (including) | 2.0 (including) |
Dnrd | Dnrd | 2.1 (including) | 2.1 (including) |
Dnrd | Dnrd | 2.2 (including) | 2.2 (including) |
Dnrd | Dnrd | 2.3 (including) | 2.3 (including) |
Dnrd | Dnrd | 2.4 (including) | 2.4 (including) |
Dnrd | Dnrd | 2.5 (including) | 2.5 (including) |
Dnrd | Dnrd | 2.6 (including) | 2.6 (including) |
Dnrd | Dnrd | 2.7 (including) | 2.7 (including) |
Dnrd | Dnrd | 2.8 (including) | 2.8 (including) |
Dnrd | Dnrd | 2.9 (including) | 2.9 (including) |