Vulnerability Details CVE-2004-0789
Multiple implementations of the DNS protocol, including (1) Poslib 1.0.2-1 and earlier as used by Posadis, (2) Axis Network products before firmware 3.13, and (3) Men & Mice Suite 2.2x before 2.2.3 and 3.5.x before 3.5.2, allow remote attackers to cause a denial of service (CPU and network bandwidth consumption) by triggering a communications loop via (a) DNS query packets with localhost as a spoofed source address, or (b) a response packet that triggers a response packet.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.02
EPSS Ranking 82.6%
CVSS Severity
CVSS v2 Score 5.0
Products affected by CVE-2004-0789
-
cpe:2.3:a:delegate:delegate:7.7.0
-
cpe:2.3:a:delegate:delegate:7.7.1
-
cpe:2.3:a:delegate:delegate:7.8.0
-
cpe:2.3:a:delegate:delegate:7.8.1
-
cpe:2.3:a:delegate:delegate:7.8.2
-
cpe:2.3:a:delegate:delegate:7.9.11
-
cpe:2.3:a:delegate:delegate:8.3.3
-
cpe:2.3:a:delegate:delegate:8.3.4
-
cpe:2.3:a:delegate:delegate:8.4.0
-
cpe:2.3:a:delegate:delegate:8.5.0
-
cpe:2.3:a:delegate:delegate:8.9
-
cpe:2.3:a:delegate:delegate:8.9.1
-
cpe:2.3:a:delegate:delegate:8.9.2
-
cpe:2.3:a:delegate:delegate:8.9.3
-
cpe:2.3:a:delegate:delegate:8.9.4
-
cpe:2.3:a:delegate:delegate:8.9.5
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
cpe:2.3:a:don_moore:mydns:0.10.0
-
cpe:2.3:a:don_moore:mydns:0.6
-
cpe:2.3:a:don_moore:mydns:0.7
-
cpe:2.3:a:don_moore:mydns:0.8
-
cpe:2.3:a:don_moore:mydns:0.9
-
cpe:2.3:a:maradns:maradns:0.5.28
-
cpe:2.3:a:maradns:maradns:0.5.29
-
cpe:2.3:a:maradns:maradns:0.5.30
-
cpe:2.3:a:maradns:maradns:0.5.31
-
cpe:2.3:a:maradns:maradns:0.8.05
-
cpe:2.3:a:pliant:pliant_dns_server:*
-
cpe:2.3:a:posadis:posadis:0.50.4
-
cpe:2.3:a:posadis:posadis:0.50.5
-
cpe:2.3:a:posadis:posadis:0.50.6
-
cpe:2.3:a:posadis:posadis:0.50.7
-
cpe:2.3:a:posadis:posadis:0.50.8
-
cpe:2.3:a:posadis:posadis:0.50.9
-
cpe:2.3:a:posadis:posadis:0.60.0
-
cpe:2.3:a:posadis:posadis:0.60.1
-
cpe:2.3:a:posadis:posadis:m5pre1
-
cpe:2.3:a:posadis:posadis:m5pre2
-
cpe:2.3:a:qbik:wingate:3.0
-
cpe:2.3:a:qbik:wingate:4.0.1
-
cpe:2.3:a:qbik:wingate:4.1_beta_a
-
cpe:2.3:a:qbik:wingate:6.0
-
cpe:2.3:a:qbik:wingate:6.0.1_build_993
-
cpe:2.3:a:qbik:wingate:6.0.1_build_995
-
cpe:2.3:a:team_johnlong:raidendnsd:*
-
cpe:2.3:h:axis:2100_network_camera:2.0
-
cpe:2.3:h:axis:2100_network_camera:2.01
-
cpe:2.3:h:axis:2100_network_camera:2.02
-
cpe:2.3:h:axis:2100_network_camera:2.03
-
cpe:2.3:h:axis:2100_network_camera:2.12
-
cpe:2.3:h:axis:2100_network_camera:2.30
-
cpe:2.3:h:axis:2100_network_camera:2.31
-
cpe:2.3:h:axis:2100_network_camera:2.32
-
cpe:2.3:h:axis:2100_network_camera:2.33
-
cpe:2.3:h:axis:2100_network_camera:2.34
-
cpe:2.3:h:axis:2100_network_camera:2.40
-
cpe:2.3:h:axis:2100_network_camera:2.41
-
cpe:2.3:h:axis:2110_network_camera:2.12
-
cpe:2.3:h:axis:2110_network_camera:2.30
-
cpe:2.3:h:axis:2110_network_camera:2.31
-
cpe:2.3:h:axis:2110_network_camera:2.32
-
cpe:2.3:h:axis:2110_network_camera:2.34
-
cpe:2.3:h:axis:2110_network_camera:2.40
-
cpe:2.3:h:axis:2110_network_camera:2.41
-
cpe:2.3:h:axis:2120_network_camera:2.12
-
cpe:2.3:h:axis:2120_network_camera:2.30
-
cpe:2.3:h:axis:2120_network_camera:2.31
-
cpe:2.3:h:axis:2120_network_camera:2.32
-
cpe:2.3:h:axis:2120_network_camera:2.34
-
cpe:2.3:h:axis:2120_network_camera:2.40
-
cpe:2.3:h:axis:2120_network_camera:2.41
-
cpe:2.3:h:axis:2400_video_server:3.11
-
cpe:2.3:h:axis:2400_video_server:3.12
-
cpe:2.3:h:axis:2401_video_server:3.12
-
cpe:2.3:h:axis:2420_network_camera:2.12
-
cpe:2.3:h:axis:2420_network_camera:2.30
-
cpe:2.3:h:axis:2420_network_camera:2.31
-
cpe:2.3:h:axis:2420_network_camera:2.32
-
cpe:2.3:h:axis:2420_network_camera:2.33
-
cpe:2.3:h:axis:2420_network_camera:2.34
-
cpe:2.3:h:axis:2420_network_camera:2.40
-
cpe:2.3:h:axis:2420_network_camera:2.41
-
cpe:2.3:h:axis:2460_network_dvr:3.12