D.J.Bernstein

Djbdns

3 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.47%
  • Veröffentlicht 17.02.2012 22:55:00
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The resolver in dnscache in Daniel J. Bernstein djbdns 1.05 overwrites cached server names and TTL values in NS records during the processing of a response to an A record query, which allows remote attackers to trigger continued resolvability of revo...

Exploit
  • EPSS 12.82%
  • Veröffentlicht 09.03.2009 21:30:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

The response_addname function in response.c in Daniel J. Bernstein djbdns 1.05 and earlier does not constrain offsets in the required manner, which allows remote attackers, with control over a third-party subdomain served by tinydns and axfrdns, to t...

  • EPSS 0.64%
  • Veröffentlicht 19.02.2009 16:30:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

dnscache in Daniel J. Bernstein djbdns 1.05 does not prevent simultaneous identical outbound DNS queries, which makes it easier for remote attackers to spoof DNS responses, as demonstrated by a spoofed A record in the Additional section of a response...