Buffer overflow in Paul Rombouts pdnsd before 1.2.4 has unknown impact and attack vectors. NOTE: this issue might be related to the OUSPG PROTOS DNS test suite.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Pdnsd | Pdnsd | 1.0.13 (including) | 1.0.13 (including) |
Pdnsd | Pdnsd | 1.0.15 (including) | 1.0.15 (including) |
Pdnsd | Pdnsd | 1.1 (including) | 1.1 (including) |
Pdnsd | Pdnsd | 1.1.1 (including) | 1.1.1 (including) |
Pdnsd | Pdnsd | 1.1.2 (including) | 1.1.2 (including) |
Pdnsd | Pdnsd | 1.1.3 (including) | 1.1.3 (including) |
Pdnsd | Pdnsd | 1.1.4 (including) | 1.1.4 (including) |
Pdnsd | Pdnsd | 1.1.5 (including) | 1.1.5 (including) |
Pdnsd | Pdnsd | 1.1.6 (including) | 1.1.6 (including) |
Pdnsd | Pdnsd | 1.1.7a (including) | 1.1.7a (including) |
Pdnsd | Pdnsd | 1.1.8b1_par5 (including) | 1.1.8b1_par5 (including) |
Pdnsd | Pdnsd | 1.1.8b1_par6 (including) | 1.1.8b1_par6 (including) |
Pdnsd | Pdnsd | 1.1.8b1_par8 (including) | 1.1.8b1_par8 (including) |
Pdnsd | Pdnsd | 1.1.10_par (including) | 1.1.10_par (including) |
Pdnsd | Pdnsd | 1.1.11_par (including) | 1.1.11_par (including) |
Pdnsd | Pdnsd | 1.2.1_par (including) | 1.2.1_par (including) |
Pdnsd | Pdnsd | 1.2.2_par (including) | 1.2.2_par (including) |
Pdnsd | Pdnsd | 1.2.3_par (including) | 1.2.3_par (including) |
Pdnsd | Ubuntu | dapper | * |
Pdnsd | Ubuntu | devel | * |
Pdnsd | Ubuntu | edgy | * |
Pdnsd | Ubuntu | feisty | * |
Pdnsd | Ubuntu | gutsy | * |
Pdnsd | Ubuntu | hardy | * |
Pdnsd | Ubuntu | intrepid | * |
Pdnsd | Ubuntu | jaunty | * |
Pdnsd | Ubuntu | karmic | * |