ID

VAR-200512-0639


CVE

CVE-2005-0038


TITLE

DNS implementations vulnerable to denial-of-service attacks via malformed DNS queries

Trust: 0.8

sources: CERT/CC: VU#23495

DESCRIPTION

The DNS implementation of PowerDNS 2.9.16 and earlier allows remote attackers to cause a denial of service via a compressed DNS packet with a label length byte with an incorrect offset, which could trigger an infinite loop. Incorrect decoding of malformed DNS packets causes certain DNS implementations to hang or crash. Multiple DNS vendors are susceptible to a remote denial-of-service vulnerability. This issue affects both DNS servers and clients. This issue arises when an affected application handles a specially crafted DNS message. A successful attack would crash the affected client or server. ---------------------------------------------------------------------- Bist Du interessiert an einem neuen Job in IT-Sicherheit? Secunia hat zwei freie Stellen als Junior und Senior Spezialist in IT- Sicherheit: http://secunia.com/secunia_vacancies/ ---------------------------------------------------------------------- TITLE: Cisco Various Products Compressed DNS Messages Denial of Service SECUNIA ADVISORY ID: SA15472 VERIFY ADVISORY: http://secunia.com/advisories/15472/ CRITICAL: Less critical IMPACT: DoS WHERE: >From remote OPERATING SYSTEM: Cisco ATA 180 Series Analog Telephone Adaptors http://secunia.com/product/2810/ SOFTWARE: Cisco IP Phone 7900 Series http://secunia.com/product/2809/ Cisco ACNS Software Version 5.x http://secunia.com/product/2268/ Cisco ACNS Software Version 4.x http://secunia.com/product/2269/ Cisco Unity Express 2.x http://secunia.com/product/5151/ DESCRIPTION: A vulnerability has been reported in various Cisco products, which can be exploited by malicious people to cause a DoS (Denial of Service). The vulnerability is caused due to an error in the DNS implementation during the decompression of compressed DNS messages and can be exploited via a specially crafted DNS packet containing invalid information in the compressed section. Successful exploitation crashes a vulnerable device or causes it to function abnormally. The vulnerability affects the following products: * Cisco IP Phones 7902/7905/7912 * Cisco ATA (Analog Telephone Adaptor) 186/188 * Cisco Unity Express The following Cisco ACNS (Application and Content Networking System) devices are also affected: * Cisco 500 Series Content Engines * Cisco 7300 Series Content Engines * Cisco Content Routers 4400 series * Cisco Content Distribution Manager 4600 series * Cisco Content Engine Module for Cisco 2600, 2800, 3600, 3700, and 3800 series Integrated Service Routers. SOLUTION: See patch matrix in vendor advisory for information about fixes. http://www.cisco.com/warp/public/707/cisco-sn-20050524-dns.shtml#software PROVIDED AND/OR DISCOVERED BY: NISCC credits Dr. Steve Beaty. ORIGINAL ADVISORY: Cisco: http://www.cisco.com/warp/public/707/cisco-sn-20050524-dns.shtml NISCC: http://www.niscc.gov.uk/niscc/docs/al-20050524-00433.html ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 1.98

sources: NVD: CVE-2005-0038 // CERT/CC: VU#23495 // BID: 13729 // PACKETSTORM: 37713

AFFECTED PRODUCTS

vendor:powerdnsmodel:powerdnsscope:eqversion:2.9.15

Trust: 1.9

vendor:powerdnsmodel:powerdnsscope:eqversion:2.9.4

Trust: 1.6

vendor:powerdnsmodel:powerdnsscope:eqversion:2.9.5

Trust: 1.6

vendor:powerdnsmodel:powerdnsscope:eqversion:2.9.6

Trust: 1.6

vendor:powerdnsmodel:powerdnsscope:eqversion:2.9.14

Trust: 1.6

vendor:powerdnsmodel:powerdnsscope:eqversion:2.9.8

Trust: 1.6

vendor:powerdnsmodel:powerdnsscope:eqversion:2.9.3a

Trust: 1.6

vendor:powerdnsmodel:powerdnsscope:eqversion:2.9.7

Trust: 1.6

vendor:powerdnsmodel:powerdnsscope:eqversion:2.9.2

Trust: 1.6

vendor:powerdnsmodel:powerdnsscope:eqversion:2.8

Trust: 1.3

vendor:powerdnsmodel:powerdnsscope:eqversion:2.9.12

Trust: 1.0

vendor:powerdnsmodel:powerdnsscope:eqversion:2.9.13

Trust: 1.0

vendor:powerdnsmodel:powerdnsscope:lteversion:2.9.16

Trust: 1.0

vendor:powerdnsmodel:powerdnsscope:eqversion:2.9.10

Trust: 1.0

vendor:powerdnsmodel:powerdnsscope:eqversion:2.9.0

Trust: 1.0

vendor:powerdnsmodel:powerdnsscope:eqversion:2.0_rc1

Trust: 1.0

vendor:powerdnsmodel:powerdnsscope:eqversion:2.9.11

Trust: 1.0

vendor:powerdnsmodel:powerdnsscope:eqversion:2.9.1

Trust: 1.0

vendor:powerdnsmodel:powerdnsscope:eqversion:2.9.16

Trust: 0.9

vendor:etherealmodel: - scope: - version: -

Trust: 0.8

vendor:tcpdumpmodel: - scope: - version: -

Trust: 0.8

vendor:ciscomodel:application & content networking softwarescope: - version: -

Trust: 0.6

vendor:powerdnsmodel:rc1scope:eqversion:2.0

Trust: 0.3

vendor:dnrdmodel:dnrdscope:eqversion:2.10

Trust: 0.3

vendor:dnrdmodel:dnrdscope:eqversion:2.9

Trust: 0.3

vendor:dnrdmodel:dnrdscope:eqversion:2.8

Trust: 0.3

vendor:dnrdmodel:dnrdscope:eqversion:2.7

Trust: 0.3

vendor:dnrdmodel:dnrdscope:eqversion:2.6

Trust: 0.3

vendor:dnrdmodel:dnrdscope:eqversion:2.5

Trust: 0.3

vendor:dnrdmodel:dnrdscope:eqversion:2.4

Trust: 0.3

vendor:dnrdmodel:dnrdscope:eqversion:2.3

Trust: 0.3

vendor:dnrdmodel:dnrdscope:eqversion:2.2

Trust: 0.3

vendor:dnrdmodel:dnrdscope:eqversion:2.1

Trust: 0.3

vendor:dnrdmodel:dnrdscope:eqversion:2.0

Trust: 0.3

vendor:dnrdmodel:dnrdscope:eqversion:1.4

Trust: 0.3

vendor:dnrdmodel:dnrdscope:eqversion:1.3

Trust: 0.3

vendor:dnrdmodel:dnrdscope:eqversion:1.2

Trust: 0.3

vendor:dnrdmodel:dnrdscope:eqversion:1.1

Trust: 0.3

vendor:dnrdmodel:dnrdscope:eqversion:1.0

Trust: 0.3

vendor:delegatemodel:delegatescope:eqversion:8.10.2

Trust: 0.3

vendor:delegatemodel:delegatescope:eqversion:8.10.1

Trust: 0.3

vendor:delegatemodel:delegatescope:eqversion:8.10

Trust: 0.3

vendor:delegatemodel:delegatescope:eqversion:8.9.6

Trust: 0.3

vendor:delegatemodel:delegatescope:eqversion:8.9.5

Trust: 0.3

vendor:delegatemodel:delegatescope:eqversion:8.9.4

Trust: 0.3

vendor:delegatemodel:delegatescope:eqversion:8.9.3

Trust: 0.3

vendor:delegatemodel:delegatescope:eqversion:8.9.2

Trust: 0.3

vendor:delegatemodel:delegatescope:eqversion:8.9.1

Trust: 0.3

vendor:delegatemodel:delegatescope:eqversion:8.9

Trust: 0.3

vendor:delegatemodel:delegatescope:eqversion:8.5.0

Trust: 0.3

vendor:delegatemodel:delegatescope:eqversion:8.4.0

Trust: 0.3

vendor:delegatemodel:delegatescope:eqversion:8.3.4

Trust: 0.3

vendor:delegatemodel:delegatescope:eqversion:8.3.3

Trust: 0.3

vendor:delegatemodel:delegatescope:eqversion:7.9.11

Trust: 0.3

vendor:delegatemodel:delegatescope:eqversion:7.8.2

Trust: 0.3

vendor:delegatemodel:delegatescope:eqversion:7.8.1

Trust: 0.3

vendor:delegatemodel:delegatescope:eqversion:7.8.0

Trust: 0.3

vendor:delegatemodel:delegatescope:eqversion:7.7.1

Trust: 0.3

vendor:delegatemodel:delegatescope:eqversion:7.7.0

Trust: 0.3

vendor:ciscomodel:unity expressscope: - version: -

Trust: 0.3

vendor:ciscomodel:subscriber edge services managerscope:eqversion:3.3(1)

Trust: 0.3

vendor:ciscomodel:subscriber edge services managerscope:eqversion:3.2(2)

Trust: 0.3

vendor:ciscomodel:subscriber edge services managerscope:eqversion:3.2(1)

Trust: 0.3

vendor:ciscomodel:ip phonescope:eqversion:79120

Trust: 0.3

vendor:ciscomodel:ip phonescope:eqversion:7905

Trust: 0.3

vendor:ciscomodel:ip phonescope:eqversion:7902

Trust: 0.3

vendor:ciscomodel:content routerscope:eqversion:4450

Trust: 0.3

vendor:ciscomodel:content routerscope:eqversion:44304.1

Trust: 0.3

vendor:ciscomodel:content routerscope:eqversion:44304.0

Trust: 0.3

vendor:ciscomodel:content routerscope:eqversion:4430

Trust: 0.3

vendor:ciscomodel:content engine module for cisco router seriesscope:eqversion:3800

Trust: 0.3

vendor:ciscomodel:content engine module for cisco router seriesscope:eqversion:3700

Trust: 0.3

vendor:ciscomodel:content engine module for cisco router seriesscope:eqversion:3600

Trust: 0.3

vendor:ciscomodel:content engine module for cisco router seriesscope:eqversion:2800

Trust: 0.3

vendor:ciscomodel:content engine module for cisco router seriesscope:eqversion:2600

Trust: 0.3

vendor:ciscomodel:content enginescope:eqversion:7325

Trust: 0.3

vendor:ciscomodel:content enginescope:eqversion:73204.1

Trust: 0.3

vendor:ciscomodel:content enginescope:eqversion:73204.0

Trust: 0.3

vendor:ciscomodel:content enginescope:eqversion:73203.1

Trust: 0.3

vendor:ciscomodel:content enginescope:eqversion:73202.2.0

Trust: 0.3

vendor:ciscomodel:content enginescope:eqversion:7320

Trust: 0.3

vendor:ciscomodel:content enginescope:eqversion:5904.1

Trust: 0.3

vendor:ciscomodel:content enginescope:eqversion:5904.0

Trust: 0.3

vendor:ciscomodel:content enginescope:eqversion:5903.1

Trust: 0.3

vendor:ciscomodel:content enginescope:eqversion:5902.2.0

Trust: 0.3

vendor:ciscomodel:content enginescope:eqversion:590

Trust: 0.3

vendor:ciscomodel:content enginescope:eqversion:565

Trust: 0.3

vendor:ciscomodel:content enginescope:eqversion:5604.1

Trust: 0.3

vendor:ciscomodel:content enginescope:eqversion:5604.0

Trust: 0.3

vendor:ciscomodel:content enginescope:eqversion:5603.1

Trust: 0.3

vendor:ciscomodel:content enginescope:eqversion:5602.2.0

Trust: 0.3

vendor:ciscomodel:content enginescope:eqversion:560

Trust: 0.3

vendor:ciscomodel:content enginescope:eqversion:510

Trust: 0.3

vendor:ciscomodel:content enginescope:eqversion:5074.1

Trust: 0.3

vendor:ciscomodel:content enginescope:eqversion:5074.0

Trust: 0.3

vendor:ciscomodel:content enginescope:eqversion:5073.1

Trust: 0.3

vendor:ciscomodel:content enginescope:eqversion:5072.2.0

Trust: 0.3

vendor:ciscomodel:content enginescope:eqversion:507

Trust: 0.3

vendor:ciscomodel:content distribution managerscope:eqversion:4670

Trust: 0.3

vendor:ciscomodel:content distribution managerscope:eqversion:46504.1

Trust: 0.3

vendor:ciscomodel:content distribution managerscope:eqversion:46504.0

Trust: 0.3

vendor:ciscomodel:content distribution managerscope:eqversion:4650

Trust: 0.3

vendor:ciscomodel:content distribution managerscope:eqversion:46304.1

Trust: 0.3

vendor:ciscomodel:content distribution managerscope:eqversion:46304.0

Trust: 0.3

vendor:ciscomodel:content distribution managerscope:eqversion:4630

Trust: 0.3

vendor:ciscomodel:ata-188scope: - version: -

Trust: 0.3

vendor:ciscomodel:ata-186scope: - version: -

Trust: 0.3

vendor:ciscomodel:application & content networking softwarescope:eqversion:5.2.3.9

Trust: 0.3

vendor:ciscomodel:application & content networking softwarescope:eqversion:5.2.1.7

Trust: 0.3

vendor:ciscomodel:application & content networking softwarescope:eqversion:5.2

Trust: 0.3

vendor:ciscomodel:application & content networking softwarescope:eqversion:5.1.13.7

Trust: 0.3

vendor:ciscomodel:application & content networking softwarescope:eqversion:5.1.11.6

Trust: 0.3

vendor:ciscomodel:application & content networking softwarescope:eqversion:5.1

Trust: 0.3

vendor:ciscomodel:application & content networking softwarescope:eqversion:5.0.17.6

Trust: 0.3

vendor:ciscomodel:application & content networking softwarescope:eqversion:5.0.5

Trust: 0.3

vendor:ciscomodel:application & content networking softwarescope:eqversion:5.0.3

Trust: 0.3

vendor:ciscomodel:application & content networking softwarescope:eqversion:5.0.1

Trust: 0.3

vendor:ciscomodel:application & content networking softwarescope:eqversion:5.0

Trust: 0.3

vendor:ciscomodel:application & content networking softwarescope:eqversion:4.2.11

Trust: 0.3

vendor:ciscomodel:application & content networking softwarescope:eqversion:4.2.9

Trust: 0.3

vendor:ciscomodel:application & content networking softwarescope:eqversion:4.2.7

Trust: 0.3

vendor:ciscomodel:application & content networking softwarescope:eqversion:4.2

Trust: 0.3

vendor:ciscomodel:application & content networking softwarescope:eqversion:4.1.3

Trust: 0.3

vendor:ciscomodel:application & content networking softwarescope:eqversion:4.1.1

Trust: 0.3

vendor:ciscomodel:application & content networking softwarescope:eqversion:4.0.3

Trust: 0.3

vendor:powerdnsmodel:powerdnsscope:neversion:2.9.17

Trust: 0.3

vendor:dnrdmodel:dnrdscope:neversion:2.18

Trust: 0.3

vendor:delegatemodel:delegatescope:neversion:8.11.1

Trust: 0.3

vendor:delegatemodel:delegatescope:neversion:8.11

Trust: 0.3

vendor:delegatemodel:delegatescope:neversion:8.10.6

Trust: 0.3

vendor:delegatemodel:delegatescope:neversion:8.10.5

Trust: 0.3

vendor:delegatemodel:delegatescope:neversion:8.10.4

Trust: 0.3

vendor:delegatemodel:delegatescope:neversion:8.10.3

Trust: 0.3

vendor:ciscomodel:subscriber edge services managerscope:neversion:3.3(2)

Trust: 0.3

vendor:ciscomodel:application & content networking softwarescope:neversion:5.3.3

Trust: 0.3

vendor:ciscomodel:application & content networking softwarescope:neversion:5.2.7

Trust: 0.3

vendor:ciscomodel:application & content networking softwarescope:neversion:5.1.15

Trust: 0.3

sources: CERT/CC: VU#23495 // BID: 13729 // CNNVD: CNNVD-200512-776 // NVD: CVE-2005-0038

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2005-0038
value: MEDIUM

Trust: 1.0

CARNEGIE MELLON: VU#23495
value: 41.92

Trust: 0.8

CNNVD: CNNVD-200512-776
value: MEDIUM

Trust: 0.6

nvd@nist.gov: CVE-2005-0038
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

sources: CERT/CC: VU#23495 // CNNVD: CNNVD-200512-776 // NVD: CVE-2005-0038

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-2005-0038

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200512-776

TYPE

Design Error

Trust: 0.9

sources: BID: 13729 // CNNVD: CNNVD-200512-776

EXTERNAL IDS

db:BIDid:13729

Trust: 2.7

db:NVDid:CVE-2005-0038

Trust: 1.9

db:OSVDBid:25291

Trust: 1.6

db:SECUNIAid:15472

Trust: 0.9

db:SECTRACKid:1014043

Trust: 0.8

db:SECTRACKid:1014044

Trust: 0.8

db:SECTRACKid:1014045

Trust: 0.8

db:SECTRACKid:1014046

Trust: 0.8

db:BIDid:1165

Trust: 0.8

db:CERT/CCid:VU#23495

Trust: 0.8

db:CNNVDid:CNNVD-200512-776

Trust: 0.6

db:PACKETSTORMid:37713

Trust: 0.1

sources: CERT/CC: VU#23495 // BID: 13729 // PACKETSTORM: 37713 // CNNVD: CNNVD-200512-776 // NVD: CVE-2005-0038

REFERENCES

url:http://www.niscc.gov.uk/niscc/docs/al-20050524-00433.html

Trust: 2.8

url:http://www.securityfocus.com/bid/13729

Trust: 2.4

url:http://www.osvdb.org/25291

Trust: 1.6

url:http://www.niscc.gov.uk/niscc/docs/re-20050524-00432.pdf?lang=en

Trust: 1.6

url:http://www.cisco.com/warp/public/707/cisco-sn-20050524-dns.shtml

Trust: 1.2

url:http://secunia.com/advisories/15472/

Trust: 0.9

url:http://www.securityfocus.com/bid/1165

Trust: 0.8

url:http://www.ciac.org/ciac/bulletins/l-015.shtml

Trust: 0.8

url:http://www.securitytracker.com/id?1014046

Trust: 0.8

url:http://www.securitytracker.com/id?1014045

Trust: 0.8

url:http://www.securitytracker.com/id?1014044

Trust: 0.8

url:http://www.securitytracker.com/id?1014043

Trust: 0.8

url:http://www.ethereal.com

Trust: 0.8

url:http://www.tcpdump.org

Trust: 0.8

url:http://secunia.com/product/2810/

Trust: 0.1

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

url:http://secunia.com/product/5151/

Trust: 0.1

url:http://www.cisco.com/warp/public/707/cisco-sn-20050524-dns.shtml#software

Trust: 0.1

url:http://secunia.com/secunia_vacancies/

Trust: 0.1

url:http://secunia.com/product/2268/

Trust: 0.1

url:http://secunia.com/product/2269/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/product/2809/

Trust: 0.1

sources: CERT/CC: VU#23495 // BID: 13729 // PACKETSTORM: 37713 // CNNVD: CNNVD-200512-776 // NVD: CVE-2005-0038

CREDITS

Discovered by Dr. Steve Beaty from the Department of Mathematical and Computer Sciences at the Metropolitan State College of Denver.

Trust: 0.9

sources: BID: 13729 // CNNVD: CNNVD-200512-776

SOURCES

db:CERT/CCid:VU#23495
db:BIDid:13729
db:PACKETSTORMid:37713
db:CNNVDid:CNNVD-200512-776
db:NVDid:CVE-2005-0038

LAST UPDATE DATE

2024-11-23T22:04:38.637000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#23495date:2005-11-15T00:00:00
db:BIDid:13729date:2016-07-06T14:40:00
db:CNNVDid:CNNVD-200512-776date:2010-06-23T00:00:00
db:NVDid:CVE-2005-0038date:2024-11-20T23:54:16.503

SOURCES RELEASE DATE

db:CERT/CCid:VU#23495date:2001-06-18T00:00:00
db:BIDid:13729date:2005-05-24T00:00:00
db:PACKETSTORMid:37713date:2005-05-29T20:22:44
db:CNNVDid:CNNVD-200512-776date:2005-12-31T00:00:00
db:NVDid:CVE-2005-0038date:2005-12-31T05:00:00