Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-cm5j-hcw6-754p

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

MaraDNS 1.3.07.12 and 1.4.08 computes hash values for DNS data without properly restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted queries with the Recursion Desired (RD) bit set. NOTE: this issue exists because of an incomplete fix for CVE-2012-0024.

MaraDNS 1.3.07.12 and 1.4.08 computes hash values for DNS data without properly restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted queries with the Recursion Desired (RD) bit set. NOTE: this issue exists because of an incomplete fix for CVE-2012-0024.

EPSS

Процентиль: 69%
0.00603
Низкий

Дефекты

CWE-20

Связанные уязвимости

ubuntu
около 14 лет назад

MaraDNS 1.3.07.12 and 1.4.08 computes hash values for DNS data without properly restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted queries with the Recursion Desired (RD) bit set. NOTE: this issue exists because of an incomplete fix for CVE-2012-0024.

nvd
около 14 лет назад

MaraDNS 1.3.07.12 and 1.4.08 computes hash values for DNS data without properly restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted queries with the Recursion Desired (RD) bit set. NOTE: this issue exists because of an incomplete fix for CVE-2012-0024.

debian
около 14 лет назад

MaraDNS 1.3.07.12 and 1.4.08 computes hash values for DNS data without ...

EPSS

Процентиль: 69%
0.00603
Низкий

Дефекты

CWE-20