MaraDNS 1.2.x < 1.2.12.05 / 1.3.x < 1.3.03 IPv6 Memory Leak Remote DoS

medium Nessus Plugin ID 73475

Synopsis

The DNS server running on the remote host is affected by a denial of service vulnerability.

Description

According to its self-reported version number, the MaraDNS server running on the remote host is affected by a memory leak issue due to improperly deallocating memory in the IPv6 code. This issue could allow a remote attacker to cause a remote denial of service via memory exhaustion by sending large amounts of invalid DNS packets.

Solution

Upgrade to MaraDNS version 1.2.12.05 / 1.3.03 or later or apply the relevant patch.

See Also

http://maradns.samiam.org/security.html

http://www.nessus.org/u?305f74d5

http://maradns.blogspot.com/2007/02/maradns-121205-released.html

http://osdir.com/ml/network.dns.maradns.general/2007-02/msg00000.html

http://maradns.samiam.org/changelog-2006-2010.html

Plugin Details

Severity: Medium

ID: 73475

File Name: maradns_1_3_03.nasl

Version: 1.3

Type: remote

Family: DNS

Published: 4/11/2014

Updated: 7/14/2018

Configuration: Enable paranoid mode

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 3.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Information

CPE: cpe:/a:maradns:maradns

Required KB Items: maradns/version, maradns/num_ver, Settings/ParanoidReport

Exploit Ease: No known exploits are available

Patch Publication Date: 2/14/2007

Vulnerability Publication Date: 2/14/2007

Reference Information

CVE: CVE-2007-3114

BID: 24337

CWE: 399