ID CVE-2006-2072
Summary Multiple unspecified vulnerabilities in DeleGate 9.x before 9.0.6 and 8.x before 8.11.6 allow remote attackers to cause a denial of service via crafted DNS responses messages that cause (1) a buffer over-read or (2) infinite recursion, which can trigger a segmentation fault or invalid memory access, as demonstrated by the OUSPG PROTOS DNS test suite.
References
Vulnerable Configurations
  • cpe:2.3:a:delegate:delegate:7.7.0:*:*:*:*:*:*:*
    cpe:2.3:a:delegate:delegate:7.7.0:*:*:*:*:*:*:*
  • cpe:2.3:a:delegate:delegate:7.7.1:*:*:*:*:*:*:*
    cpe:2.3:a:delegate:delegate:7.7.1:*:*:*:*:*:*:*
  • cpe:2.3:a:delegate:delegate:7.8.0:*:*:*:*:*:*:*
    cpe:2.3:a:delegate:delegate:7.8.0:*:*:*:*:*:*:*
  • cpe:2.3:a:delegate:delegate:7.8.1:*:*:*:*:*:*:*
    cpe:2.3:a:delegate:delegate:7.8.1:*:*:*:*:*:*:*
  • cpe:2.3:a:delegate:delegate:7.8.2:*:*:*:*:*:*:*
    cpe:2.3:a:delegate:delegate:7.8.2:*:*:*:*:*:*:*
  • cpe:2.3:a:delegate:delegate:7.9.11:*:*:*:*:*:*:*
    cpe:2.3:a:delegate:delegate:7.9.11:*:*:*:*:*:*:*
  • cpe:2.3:a:delegate:delegate:8.3.3:*:*:*:*:*:*:*
    cpe:2.3:a:delegate:delegate:8.3.3:*:*:*:*:*:*:*
  • cpe:2.3:a:delegate:delegate:8.3.4:*:*:*:*:*:*:*
    cpe:2.3:a:delegate:delegate:8.3.4:*:*:*:*:*:*:*
  • cpe:2.3:a:delegate:delegate:8.4.0:*:*:*:*:*:*:*
    cpe:2.3:a:delegate:delegate:8.4.0:*:*:*:*:*:*:*
  • cpe:2.3:a:delegate:delegate:8.5.0:*:*:*:*:*:*:*
    cpe:2.3:a:delegate:delegate:8.5.0:*:*:*:*:*:*:*
  • cpe:2.3:a:delegate:delegate:8.9:*:*:*:*:*:*:*
    cpe:2.3:a:delegate:delegate:8.9:*:*:*:*:*:*:*
  • cpe:2.3:a:delegate:delegate:8.9.1:*:*:*:*:*:*:*
    cpe:2.3:a:delegate:delegate:8.9.1:*:*:*:*:*:*:*
  • cpe:2.3:a:delegate:delegate:8.9.2:*:*:*:*:*:*:*
    cpe:2.3:a:delegate:delegate:8.9.2:*:*:*:*:*:*:*
  • cpe:2.3:a:delegate:delegate:8.9.3:*:*:*:*:*:*:*
    cpe:2.3:a:delegate:delegate:8.9.3:*:*:*:*:*:*:*
  • cpe:2.3:a:delegate:delegate:8.9.4:*:*:*:*:*:*:*
    cpe:2.3:a:delegate:delegate:8.9.4:*:*:*:*:*:*:*
  • cpe:2.3:a:delegate:delegate:8.9.5:*:*:*:*:*:*:*
    cpe:2.3:a:delegate:delegate:8.9.5:*:*:*:*:*:*:*
  • cpe:2.3:a:delegate:delegate:8.9.6:*:*:*:*:*:*:*
    cpe:2.3:a:delegate:delegate:8.9.6:*:*:*:*:*:*:*
  • cpe:2.3:a:delegate:delegate:8.10:*:*:*:*:*:*:*
    cpe:2.3:a:delegate:delegate:8.10:*:*:*:*:*:*:*
  • cpe:2.3:a:delegate:delegate:8.10.1:*:*:*:*:*:*:*
    cpe:2.3:a:delegate:delegate:8.10.1:*:*:*:*:*:*:*
  • cpe:2.3:a:delegate:delegate:8.10.2:*:*:*:*:*:*:*
    cpe:2.3:a:delegate:delegate:8.10.2:*:*:*:*:*:*:*
  • cpe:2.3:a:delegate:delegate:8.10.3:*:*:*:*:*:*:*
    cpe:2.3:a:delegate:delegate:8.10.3:*:*:*:*:*:*:*
  • cpe:2.3:a:delegate:delegate:8.10.4:*:*:*:*:*:*:*
    cpe:2.3:a:delegate:delegate:8.10.4:*:*:*:*:*:*:*
  • cpe:2.3:a:delegate:delegate:8.10.5:*:*:*:*:*:*:*
    cpe:2.3:a:delegate:delegate:8.10.5:*:*:*:*:*:*:*
  • cpe:2.3:a:delegate:delegate:8.10.6:*:*:*:*:*:*:*
    cpe:2.3:a:delegate:delegate:8.10.6:*:*:*:*:*:*:*
  • cpe:2.3:a:delegate:delegate:8.11:*:*:*:*:*:*:*
    cpe:2.3:a:delegate:delegate:8.11:*:*:*:*:*:*:*
  • cpe:2.3:a:delegate:delegate:8.11.1:*:*:*:*:*:*:*
    cpe:2.3:a:delegate:delegate:8.11.1:*:*:*:*:*:*:*
  • cpe:2.3:a:delegate:delegate:8.11.2:*:*:*:*:*:*:*
    cpe:2.3:a:delegate:delegate:8.11.2:*:*:*:*:*:*:*
  • cpe:2.3:a:delegate:delegate:8.11.3:*:*:*:*:*:*:*
    cpe:2.3:a:delegate:delegate:8.11.3:*:*:*:*:*:*:*
  • cpe:2.3:a:delegate:delegate:8.11.4:*:*:*:*:*:*:*
    cpe:2.3:a:delegate:delegate:8.11.4:*:*:*:*:*:*:*
  • cpe:2.3:a:delegate:delegate:8.11.5:*:*:*:*:*:*:*
    cpe:2.3:a:delegate:delegate:8.11.5:*:*:*:*:*:*:*
  • cpe:2.3:a:delegate:delegate:9.0:*:*:*:*:*:*:*
    cpe:2.3:a:delegate:delegate:9.0:*:*:*:*:*:*:*
  • cpe:2.3:a:delegate:delegate:9.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:delegate:delegate:9.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:delegate:delegate:9.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:delegate:delegate:9.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:delegate:delegate:9.0.3:*:*:*:*:*:*:*
    cpe:2.3:a:delegate:delegate:9.0.3:*:*:*:*:*:*:*
  • cpe:2.3:a:delegate:delegate:9.0.4:*:*:*:*:*:*:*
    cpe:2.3:a:delegate:delegate:9.0.4:*:*:*:*:*:*:*
  • cpe:2.3:a:delegate:delegate:9.0.5:*:*:*:*:*:*:*
    cpe:2.3:a:delegate:delegate:9.0.5:*:*:*:*:*:*:*
CVSS
Base: 5.0 (as of 20-07-2017 - 01:31)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
NONE NONE PARTIAL
cvss-vector via4 AV:N/AC:L/Au:N/C:N/I:N/A:P
refmap via4
bid 17691
cert-vn VU#955777
misc
sectrack 1015991
secunia 19750
vupen
  • ADV-2006-1505
  • ADV-2006-1506
xf dns-improper-request-handling(26081)
Last major update 20-07-2017 - 01:31
Published 27-04-2006 - 22:02
Last modified 20-07-2017 - 01:31
Back to Top