The DNS implementation of DNRD before 2.10 allows remote attackers to cause a denial of service via a compressed DNS packet with a label length byte with an incorrect offset, which could trigger an infinite loop.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Dnrd | Dnrd | 2.5 | 2.5 |
Dnrd | Dnrd | 2.9 | 2.9 |
Dnrd | Dnrd | 2.3 | 2.3 |
Dnrd | Dnrd | 1.1 | 1.1 |
Dnrd | Dnrd | 1.3 | 1.3 |
Dnrd | Dnrd | 1.2 | 1.2 |
Dnrd | Dnrd | 2.1 | 2.1 |
Dnrd | Dnrd | 2.7 | 2.7 |
Dnrd | Dnrd | 2.6 | 2.6 |
Dnrd | Dnrd | 2.8 | 2.8 |
Dnrd | Dnrd | 1.4 | 1.4 |
Dnrd | Dnrd | 2.4 | 2.4 |
Dnrd | Dnrd | 2.2 | 2.2 |
Dnrd | Dnrd | 1.0 | 1.0 |
Dnrd | Dnrd | 2.0 | 2.0 |