Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:maradns:maradns:1.3.03:*:*:*:*:*:*:*", "matchCriteriaId": "4152EC32-1A1E-4C8E-BF22-7E610D9EE3C8", "vulnerable": true}, {"criteria": "cpe:2.3:a:maradns:maradns:1.3.04:*:*:*:*:*:*:*", "matchCriteriaId": "CB9E2D75-5874-4115-B8A1-BDB363C1578D", "vulnerable": true}, {"criteria": "cpe:2.3:a:maradns:maradns:1.3.05:*:*:*:*:*:*:*", "matchCriteriaId": "48DB2061-1E36-4C1B-AA12-84C143D0A270", "vulnerable": true}, {"criteria": "cpe:2.3:a:maradns:maradns:1.3.06:*:*:*:*:*:*:*", "matchCriteriaId": "EE3C6973-CDB3-45F9-BD43-0C74B231FFB8", "vulnerable": true}, {"criteria": "cpe:2.3:a:maradns:maradns:1.3.07.01:*:*:*:*:*:*:*", "matchCriteriaId": "DA6C5C7B-02E6-4AC4-99A6-2D50BA66CED0", "vulnerable": true}, {"criteria": "cpe:2.3:a:maradns:maradns:1.3.07.02:*:*:*:*:*:*:*", "matchCriteriaId": "05BF942C-EF7E-4320-AF8A-8BEEDDEE4D41", "vulnerable": true}, {"criteria": "cpe:2.3:a:maradns:maradns:1.3.07.03:*:*:*:*:*:*:*", "matchCriteriaId": "3D3D577E-F9DC-4616-9A6A-402C212D5A70", "vulnerable": true}, {"criteria": "cpe:2.3:a:maradns:maradns:1.3.07.04:*:*:*:*:*:*:*", "matchCriteriaId": "4DA50FF0-7BE7-4B3F-B27F-37539D4D9D4F", "vulnerable": true}, {"criteria": "cpe:2.3:a:maradns:maradns:1.3.07.05:*:*:*:*:*:*:*", "matchCriteriaId": "5BF9CAA0-24E8-4D13-BABC-40BFF5B97D60", "vulnerable": true}, {"criteria": "cpe:2.3:a:maradns:maradns:1.3.07.06:*:*:*:*:*:*:*", "matchCriteriaId": "987E3CDC-C578-4850-850F-BB92F88D72B3", "vulnerable": true}, {"criteria": "cpe:2.3:a:maradns:maradns:1.3.07.07:*:*:*:*:*:*:*", "matchCriteriaId": "A6464C92-02BF-4591-89B0-F7D7826E2B76", "vulnerable": true}, {"criteria": "cpe:2.3:a:maradns:maradns:1.3.07.08:*:*:*:*:*:*:*", "matchCriteriaId": "755494B1-8F52-420D-8AC8-D8DAD6D093D6", "vulnerable": true}, {"criteria": "cpe:2.3:a:maradns:maradns:1.3.07.09:*:*:*:*:*:*:*", "matchCriteriaId": "BCF1FE9C-CB27-4306-B5A1-ADC4CC2BFA00", "vulnerable": true}, {"criteria": "cpe:2.3:a:maradns:maradns:1.3.08:*:*:*:*:*:*:*", "matchCriteriaId": "4CA71AE3-2704-4662-8219-53C2D27EEB17", "vulnerable": true}, {"criteria": "cpe:2.3:a:maradns:maradns:1.3.09:*:*:*:*:*:*:*", "matchCriteriaId": "C1C9763D-55F2-4776-AD68-D446B62FC1CD", "vulnerable": true}, {"criteria": "cpe:2.3:a:maradns:maradns:1.3.10:*:*:*:*:*:*:*", "matchCriteriaId": "349F8D05-64B6-4681-B7C0-2901348A796A", "vulnerable": true}, {"criteria": "cpe:2.3:a:maradns:maradns:1.3.11:*:*:*:*:*:*:*", "matchCriteriaId": "7A88619F-859A-4FD4-9D41-FB99B5C3ABE2", "vulnerable": true}, {"criteria": "cpe:2.3:a:maradns:maradns:1.3.12:*:*:*:*:*:*:*", "matchCriteriaId": "41A5E951-950C-489F-8837-FC12651C723B", "vulnerable": true}, {"criteria": "cpe:2.3:a:maradns:maradns:1.3.13:*:*:*:*:*:*:*", "matchCriteriaId": "CFC05DB6-60B4-4C7E-B57F-B5CCEFD41428", "vulnerable": true}, {"criteria": "cpe:2.3:a:maradns:maradns:1.3.14:*:*:*:*:*:*:*", "matchCriteriaId": "411BC0D2-75BF-4E90-BCE4-228AB5821EA9", "vulnerable": true}, {"criteria": "cpe:2.3:a:maradns:maradns:1.4.01:*:*:*:*:*:*:*", "matchCriteriaId": "9CFA46FC-7283-4877-A943-1CEBC933BF9E", "vulnerable": true}, {"criteria": "cpe:2.3:a:maradns:maradns:1.4.02:*:*:*:*:*:*:*", "matchCriteriaId": "9DD92FB9-0F1D-4A8D-9F22-94CE5A2FC949", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "cveTags": [], "descriptions": [{"lang": "en", "value": "parse/Csv2_parse.c in MaraDNS 1.3.03, and other versions before 1.4.03, does not properly handle hostnames that do not end in a \".\" (dot) character, which allows remote attackers to cause a denial of service (NULL pointer dereference) via a crafted csv2 zone file."}, {"lang": "es", "value": "parse/Csv2_parse.c en MaraDNS V1.3.03, y otras versiones anteriores v1.4.03 no maneja adecuadamente los hombres host que no terminan en el caracter \".\" (punto), lo que permite a atacantes remotos causar una denegaci\u00f3n de servicio (desreferencia de puntero nulo) a trav\u00e9s de fichero csv2 zone manipulado. \r\n"}], "evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/476.html\r\n\r\n'NULL Pointer Dereference'", "id": "CVE-2010-2444", "lastModified": "2025-04-11T00:51:21.963", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": {"accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0"}, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true}]}, "published": "2010-06-25T18:30:01.610", "references": [{"source": "cve@mitre.org", "tags": ["Patch"], "url": "http://maradns.org/download/maradns-1.4.02-parse_segfault.patch"}, {"source": "cve@mitre.org", "tags": ["Patch"], "url": "http://www.openwall.com/lists/oss-security/2010/06/09/4"}, {"source": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2010/06/24/5"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch"], "url": "http://maradns.org/download/maradns-1.4.02-parse_segfault.patch"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch"], "url": "http://www.openwall.com/lists/oss-security/2010/06/09/4"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2010/06/24/5"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [{"description": [{"lang": "en", "value": "NVD-CWE-Other"}], "source": "nvd@nist.gov", "type": "Primary"}]}