MaraDNS < 1.4.14 / 2.0.x < 2.0.09 Deadwood Out-of-Bounds DoS

medium Nessus Plugin ID 73484


The DNS server running on the remote host is affected by a denial of service vulnerability.


According to its self-reported version number, the MaraDNS server running on the remote host may be running a version of Deadwood, a recursive resolver bundled with MaraDNS, which is affected by an out-of-bounds read error. This issue exists due to the lack of bounds checking in the 'DwCompress.c' and 'DwRecurse.c' source files. This issue could allow a remote attacker to crash the recursive DNS resolver, resulting in a denial of service.

Note that this only affects the Deadwood component.


Upgrade to MaraDNS version 1.4.14 / 2.0.09 or later.

See Also

Plugin Details

Severity: Medium

ID: 73484

File Name: maradns_2_0_09.nasl

Version: 1.6

Type: remote

Family: DNS

Published: 4/11/2014

Updated: 11/27/2019

Configuration: Enable paranoid mode

Risk Information


Risk Factor: Low

Score: 3.6


Risk Factor: Medium

Base Score: 4.3

Temporal Score: 3.2

Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P

Temporal Vector: E:U/RL:OF/RC:C

CVSS Score Source: CVE-2014-2032


Risk Factor: Medium

Base Score: 5.9

Temporal Score: 5.2

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H

Temporal Vector: E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:maradns:maradns

Required KB Items: maradns/version, maradns/num_ver, Settings/ParanoidReport

Exploit Ease: No known exploits are available

Patch Publication Date: 2/12/2014

Vulnerability Publication Date: 2/12/2014

Reference Information

CVE: CVE-2014-2031, CVE-2014-2032

BID: 65595, 65689