MaraDNS 1.2.x < 1.2.12.06 / 1.3.x < 1.3.05 Invalid DNS Packet Fields Remote DoS

high Nessus Plugin ID 73476

Synopsis

The DNS server running on the remote host is affected by a denial of service vulnerability.

Description

According to its self-reported version number, the MaraDNS server running on the remote host is affected by a memory leak issue when a DNS packet with a value other than zero is in the Opcode field or a value other than one is in the Class field. This issue could allow a remote attacker to cause a remote denial of service via memory exhaustion by sending large amounts of specially crafted DNS packets.

Solution

Upgrade to MaraDNS version 1.2.12.06 / 1.3.05 or later or apply the relevant patch.

See Also

http://maradns.samiam.org/security.html

http://www.nessus.org/u?c89bea3c

http://maradns.samiam.org/download.html

http://maradns.samiam.org/changelog-2006-2010.html

Plugin Details

Severity: High

ID: 73476

File Name: maradns_1_3_05.nasl

Version: 1.4

Type: remote

Family: DNS

Published: 4/11/2014

Updated: 7/14/2018

Configuration: Enable paranoid mode

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: High

Base Score: 7.8

Temporal Score: 5.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C

Vulnerability Information

CPE: cpe:/a:maradns:maradns

Required KB Items: maradns/version, maradns/num_ver, Settings/ParanoidReport

Exploit Ease: No known exploits are available

Patch Publication Date: 5/17/2007

Vulnerability Publication Date: 5/17/2007

Reference Information

CVE: CVE-2007-3115

BID: 24337

CWE: 399