Multiple implementations of the DNS protocol, including (1) Poslib 1.0.2-1 and earlier as used by Posadis, (2) Axis Network products before firmware 3.13, and (3) Men & Mice Suite 2.2x before 2.2.3 and 3.5.x before 3.5.2, allow remote attackers to cause a denial of service (CPU and network bandwidth consumption) by triggering a communications loop via (a) DNS query packets with localhost as a spoofed source address, or (b) a response packet that triggers a response packet.
                
            References
                    | Link | Resource | 
|---|---|
| http://secunia.com/advisories/13145 | Patch | 
| http://securitytracker.com/id?1012157 | Patch | 
| http://www.niscc.gov.uk/niscc/docs/al-20041130-00862.html?lang=en | Vendor Advisory | 
| http://www.niscc.gov.uk/niscc/docs/re-20041109-00957.pdf | Vendor Advisory | 
| http://www.posadis.org/advisories/pos_adv_006.txt | Patch Vendor Advisory | 
| http://www.securityfocus.com/bid/11642 | Patch | 
| https://exchange.xforce.ibmcloud.com/vulnerabilities/17997 | 
Configurations
                    Configuration 1 (hide)
            
            
  | 
    
Configuration 2 (hide)
            
            
  | 
    
History
                    No history.
Information
                Published : 2004-12-31 05:00
Updated : 2017-07-11 01:30
NVD link : CVE-2004-0789
Mitre link : CVE-2004-0789
CVE.ORG link : CVE-2004-0789
JSON object : View
Products Affected
                posadis
- posadis
 
axis
- 2420_network_camera
 - 2120_network_camera
 - 2460_network_dvr
 - 2110_network_camera
 - 2400_video_server
 - 2401_video_server
 - 2100_network_camera
 
delegate
- delegate
 
team_johnlong
- raidendnsd
 
maradns
- maradns
 
don_moore
- mydns
 
pliant
- pliant_dns_server
 
qbik
- wingate
 
dnrd
- dnrd
 
CWE
                