{"id":"CVE-2012-0024","details":"MaraDNS before 1.3.07.12 and 1.4.x before 1.4.08 computes hash values for DNS data without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted queries with the Recursion Desired (RD) bit set.","modified":"2026-04-10T03:44:10.667223Z","published":"2012-01-08T00:55:03Z","references":[{"type":"ADVISORY","url":"http://openwall.com/lists/oss-security/2012/01/03/13"},{"type":"ADVISORY","url":"http://openwall.com/lists/oss-security/2012/01/03/6"},{"type":"ADVISORY","url":"http://samiam.org/blog/20111229.html"},{"type":"ADVISORY","url":"https://bugzilla.redhat.com/show_bug.cgi?id=771428"},{"type":"ARTICLE","url":"http://openwall.com/lists/oss-security/2012/01/03/13"},{"type":"ARTICLE","url":"http://openwall.com/lists/oss-security/2012/01/03/6"},{"type":"FIX","url":"http://samiam.org/blog/20111229.html"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=771428"}],"schema_version":"1.7.5"}