CVE-2005-0038
https://notcve.org/view.php?id=CVE-2005-0038
The DNS implementation of PowerDNS 2.9.16 and earlier allows remote attackers to cause a denial of service via a compressed DNS packet with a label length byte with an incorrect offset, which could trigger an infinite loop. • http://www.niscc.gov.uk/niscc/docs/al-20050524-00433.html http://www.niscc.gov.uk/niscc/docs/re-20050524-00432.pdf?lang=en http://www.osvdb.org/25291 http://www.securityfocus.com/bid/13729 •
CVE-2005-2302
https://notcve.org/view.php?id=CVE-2005-2302
PowerDNS before 2.9.18, when allowing recursion to a restricted range of IP addresses, does not properly handle questions from clients that are denied recursion, which could cause a "blank out" of answers to those clients that are allowed to use recursion. PowerDNS anterior a la 2.9.18, cuando permite recursión en un rango restringido de direcciones IP, no maneja adecuadamente peticiones de clientes a los que se les deniega la recursión. Esto podría causar un "bank out" de respuestas a aquellos clientes que sí les es permitido usar recursión. • http://doc.powerdns.com/changelog.html#CHANGELOG-2-9-18 http://marc.info/?l=bugtraq&m=112155941310297&w=2 http://securitytracker.com/id?1014504 http://www.novell.com/linux/security/advisories/2005_19_sr.html •
CVE-2005-2301
https://notcve.org/view.php?id=CVE-2005-2301
PowerDNS before 2.9.18, when running with an LDAP backend, does not properly escape LDAP queries, which allows remote attackers to cause a denial of service (failure to answer ldap questions) and possibly conduct an LDAP injection attack. PowerDNS anterior a la 2.9.18, cuando se ejecuta en LDAP, no escapa adecuadamente las peticiones LDAP, lo que permite que atacantes remotos causen una denegación de servicio. • http://doc.powerdns.com/changelog.html#CHANGELOG-2-9-18 http://marc.info/?l=bugtraq&m=112155941310297&w=2 http://securitytracker.com/id?1014504 http://www.novell.com/linux/security/advisories/2005_19_sr.html http://www.securityfocus.com/bid/14290 •
CVE-2005-0428
https://notcve.org/view.php?id=CVE-2005-0428
The DNSPacket::expand method in dnspacket.cc in PowerDNS before 2.9.17 allows remote attackers to cause a denial of service by sending a random stream of bytes. El método DNSPacket::expand en dnspacket.cc de PowerDNS anterior a la 2.9.17 permite a atacantes remotos causar la Denegación de Servicios (DoS) mediante el envío de un flujo aleatorio de bytes. • http://doc.powerdns.com/changelog.html#CHANGELOG-2-9-17 http://ds9a.nl/cgi-bin/cvstrac/pdns/tktview?tn=21 http://www.gentoo.org/security/en/glsa/glsa-200502-15.xml http://www.securityfocus.com/bid/12446 https://exchange.xforce.ibmcloud.com/vulnerabilities/19221 •