MaraDNS before 1.3.07.12 and 1.4.x before 1.4.08 computes hash values for DNS data without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted queries with the Recursion Desired (RD) bit set.
The product does not properly control the allocation and maintenance of a limited resource.
Link | Tags |
---|---|
http://samiam.org/blog/20111229.html | third party advisory patch |
https://bugzilla.redhat.com/show_bug.cgi?id=771428 | issue tracking third party advisory |
http://openwall.com/lists/oss-security/2012/01/03/6 | third party advisory mailing list |
http://openwall.com/lists/oss-security/2012/01/03/13 | third party advisory mailing list |