Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2009-1755
Analyzed
More InfoOfficial Page
Source-cve@mitre.org
View Known Exploited Vulnerability (KEV) details
Published At-22 May, 2009 | 11:52
Updated At-29 May, 2009 | 04:00

Off-by-one error in the packet_read_query_section function in packet.c in nsd 3.2.1, and process_query_section in query.c in nsd 2.3.7, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unspecified vectors that trigger a buffer overflow.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary2.05.0MEDIUM
AV:N/AC:L/Au:N/C:N/I:N/A:P
CPE Matches

nlnetlabs
nlnetlabs
>>nsd>>2.0.0
cpe:2.3:a:nlnetlabs:nsd:2.0.0:*:*:*:*:*:*:*
nlnetlabs
nlnetlabs
>>nsd>>2.0.1
cpe:2.3:a:nlnetlabs:nsd:2.0.1:*:*:*:*:*:*:*
nlnetlabs
nlnetlabs
>>nsd>>2.0.2
cpe:2.3:a:nlnetlabs:nsd:2.0.2:*:*:*:*:*:*:*
nlnetlabs
nlnetlabs
>>nsd>>2.1.0
cpe:2.3:a:nlnetlabs:nsd:2.1.0:*:*:*:*:*:*:*
nlnetlabs
nlnetlabs
>>nsd>>2.1.1
cpe:2.3:a:nlnetlabs:nsd:2.1.1:*:*:*:*:*:*:*
nlnetlabs
nlnetlabs
>>nsd>>2.1.2
cpe:2.3:a:nlnetlabs:nsd:2.1.2:*:*:*:*:*:*:*
nlnetlabs
nlnetlabs
>>nsd>>2.1.3
cpe:2.3:a:nlnetlabs:nsd:2.1.3:*:*:*:*:*:*:*
nlnetlabs
nlnetlabs
>>nsd>>2.1.4
cpe:2.3:a:nlnetlabs:nsd:2.1.4:*:*:*:*:*:*:*
nlnetlabs
nlnetlabs
>>nsd>>2.1.5
cpe:2.3:a:nlnetlabs:nsd:2.1.5:*:*:*:*:*:*:*
nlnetlabs
nlnetlabs
>>nsd>>2.2.0
cpe:2.3:a:nlnetlabs:nsd:2.2.0:*:*:*:*:*:*:*
nlnetlabs
nlnetlabs
>>nsd>>2.2.1
cpe:2.3:a:nlnetlabs:nsd:2.2.1:*:*:*:*:*:*:*
nlnetlabs
nlnetlabs
>>nsd>>2.3.0
cpe:2.3:a:nlnetlabs:nsd:2.3.0:*:*:*:*:*:*:*
nlnetlabs
nlnetlabs
>>nsd>>2.3.2
cpe:2.3:a:nlnetlabs:nsd:2.3.2:*:*:*:*:*:*:*
nlnetlabs
nlnetlabs
>>nsd>>2.3.3
cpe:2.3:a:nlnetlabs:nsd:2.3.3:*:*:*:*:*:*:*
nlnetlabs
nlnetlabs
>>nsd>>2.3.4
cpe:2.3:a:nlnetlabs:nsd:2.3.4:*:*:*:*:*:*:*
nlnetlabs
nlnetlabs
>>nsd>>2.3.5
cpe:2.3:a:nlnetlabs:nsd:2.3.5:*:*:*:*:*:*:*
nlnetlabs
nlnetlabs
>>nsd>>2.3.6
cpe:2.3:a:nlnetlabs:nsd:2.3.6:*:*:*:*:*:*:*
nlnetlabs
nlnetlabs
>>nsd>>2.3.7
cpe:2.3:a:nlnetlabs:nsd:2.3.7:*:*:*:*:*:*:*
nlnetlabs
nlnetlabs
>>nsd>>3.0.0
cpe:2.3:a:nlnetlabs:nsd:3.0.0:*:*:*:*:*:*:*
nlnetlabs
nlnetlabs
>>nsd>>3.0.1
cpe:2.3:a:nlnetlabs:nsd:3.0.1:*:*:*:*:*:*:*
nlnetlabs
nlnetlabs
>>nsd>>3.0.2
cpe:2.3:a:nlnetlabs:nsd:3.0.2:*:*:*:*:*:*:*
nlnetlabs
nlnetlabs
>>nsd>>3.0.3
cpe:2.3:a:nlnetlabs:nsd:3.0.3:*:*:*:*:*:*:*
nlnetlabs
nlnetlabs
>>nsd>>3.0.4
cpe:2.3:a:nlnetlabs:nsd:3.0.4:*:*:*:*:*:*:*
nlnetlabs
nlnetlabs
>>nsd>>3.0.5
cpe:2.3:a:nlnetlabs:nsd:3.0.5:*:*:*:*:*:*:*
nlnetlabs
nlnetlabs
>>nsd>>3.0.6
cpe:2.3:a:nlnetlabs:nsd:3.0.6:*:*:*:*:*:*:*
nlnetlabs
nlnetlabs
>>nsd>>3.0.7
cpe:2.3:a:nlnetlabs:nsd:3.0.7:*:*:*:*:*:*:*
nlnetlabs
nlnetlabs
>>nsd>>3.0.8
cpe:2.3:a:nlnetlabs:nsd:3.0.8:*:*:*:*:*:*:*
nlnetlabs
nlnetlabs
>>nsd>>3.1.0
cpe:2.3:a:nlnetlabs:nsd:3.1.0:*:*:*:*:*:*:*
nlnetlabs
nlnetlabs
>>nsd>>3.1.1
cpe:2.3:a:nlnetlabs:nsd:3.1.1:*:*:*:*:*:*:*
nlnetlabs
nlnetlabs
>>nsd>>3.2.0
cpe:2.3:a:nlnetlabs:nsd:3.2.0:*:*:*:*:*:*:*
nlnetlabs
nlnetlabs
>>nsd>>3.2.1
cpe:2.3:a:nlnetlabs:nsd:3.2.1:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-189Primarynvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=529418cve@mitre.org
Patch
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=529420cve@mitre.org
Patch
http://www.nlnetlabs.nl/publications/NSD_vulnerability_announcement.htmlcve@mitre.org
Patch
Vendor Advisory
http://www.openwall.com/lists/oss-security/2009/05/19/1cve@mitre.org
N/A
Change History
0Changes found

Details not found