CVE-2012-0024
Published: 8 January 2012
MaraDNS before 1.3.07.12 and 1.4.x before 1.4.08 computes hash values for DNS data without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted queries with the Recursion Desired (RD) bit set.
Priority
Status
Package | Release | Status |
---|---|---|
maradns Launchpad, Ubuntu, Debian |
hardy |
Ignored
(end of life)
|
lucid |
Ignored
(end of life)
|
|
maverick |
Ignored
(end of life)
|
|
natty |
Ignored
(end of life)
|
|
oneiric |
Ignored
(end of life)
|
|
precise |
Not vulnerable
(2.0.04+really1.4.09-1)
|
|
quantal |
Not vulnerable
(2.0.04+really1.4.09-1)
|
|
raring |
Not vulnerable
(2.0.04+really1.4.09-1)
|
|
saucy |
Not vulnerable
(2.0.04+really1.4.09-1)
|
|
upstream |
Released
(1.4.08)
|
|
Patches: upstream: http://maradns.org/download/patches/maradns-1.3-better_hash.patch |