{"id":"CVE-2006-4251","details":"Buffer overflow in PowerDNS Recursor 3.1.3 and earlier might allow remote attackers to execute arbitrary code via a malformed TCP DNS query that prevents Recursor from properly calculating the TCP DNS query length.","modified":"2026-04-10T03:37:42.347751Z","published":"2006-11-14T19:07:00Z","references":[{"type":"ADVISORY","url":"http://doc.powerdns.com/powerdns-advisory-2006-01.html"},{"type":"ADVISORY","url":"http://secunia.com/advisories/22824"},{"type":"ADVISORY","url":"http://secunia.com/advisories/22903"},{"type":"ADVISORY","url":"http://secunia.com/advisories/22976"},{"type":"ADVISORY","url":"http://www.debian.org/security/2006/dsa-1211"},{"type":"ADVISORY","url":"http://www.vupen.com/english/advisories/2006/4484"},{"type":"FIX","url":"http://doc.powerdns.com/powerdns-advisory-2006-01.html"},{"type":"FIX","url":"http://secunia.com/advisories/22824"},{"type":"FIX","url":"http://www.securityfocus.com/bid/21037"},{"type":"WEB","url":"http://lists.suse.com/archive/suse-security-announce/2006-Nov/0007.html"},{"type":"WEB","url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/30270"}],"schema_version":"1.7.5"}