All the vulnerabilites related to powerdns - recursor
cve-2017-15094
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://doc.powerdns.com/recursor/security-advisories/powerdns-advisory-2017-07.html | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/101982 | vdb-entry, x_refsource_BID |
Vendor | Product | Version | |
---|---|---|---|
▼ | PowerDNS | PowerDNS Recursor |
Version: from 4.0.0 up to and including 4.0.6 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T19:50:14.927Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://doc.powerdns.com/recursor/security-advisories/powerdns-advisory-2017-07.html" }, { "name": "101982", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/101982" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "PowerDNS Recursor", "vendor": "PowerDNS", "versions": [ { "status": "affected", "version": "from 4.0.0 up to and including 4.0.6" } ] } ], "datePublic": "2017-11-27T00:00:00", "descriptions": [ { "lang": "en", "value": "An issue has been found in the DNSSEC parsing code of PowerDNS Recursor from 4.0.0 up to and including 4.0.6 leading to a memory leak when parsing specially crafted DNSSEC ECDSA keys. These keys are only parsed when validation is enabled by setting dnssec to a value other than off or process-no-validate (default)." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-401", "description": "CWE-401", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2018-01-24T10:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://doc.powerdns.com/recursor/security-advisories/powerdns-advisory-2017-07.html" }, { "name": "101982", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/101982" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "DATE_PUBLIC": "2017-11-27T00:00:00", "ID": "CVE-2017-15094", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "PowerDNS Recursor", "version": { "version_data": [ { "version_value": "from 4.0.0 up to and including 4.0.6" } ] } } ] }, "vendor_name": "PowerDNS" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue has been found in the DNSSEC parsing code of PowerDNS Recursor from 4.0.0 up to and including 4.0.6 leading to a memory leak when parsing specially crafted DNSSEC ECDSA keys. These keys are only parsed when validation is enabled by setting dnssec to a value other than off or process-no-validate (default)." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-401" } ] } ] }, "references": { "reference_data": [ { "name": "https://doc.powerdns.com/recursor/security-advisories/powerdns-advisory-2017-07.html", "refsource": "CONFIRM", "url": "https://doc.powerdns.com/recursor/security-advisories/powerdns-advisory-2017-07.html" }, { "name": "101982", "refsource": "BID", "url": "http://www.securityfocus.com/bid/101982" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2017-15094", "datePublished": "2018-01-23T15:00:00Z", "dateReserved": "2017-10-08T00:00:00", "dateUpdated": "2024-09-16T16:48:39.753Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-15092
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/101982 | vdb-entry, x_refsource_BID | |
https://doc.powerdns.com/recursor/security-advisories/powerdns-advisory-2017-05.html | x_refsource_CONFIRM |
Vendor | Product | Version | |
---|---|---|---|
▼ | PowerDNS | PowerDNS Recursor |
Version: from 4.0.0 up to and including 4.0.6 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T19:50:14.930Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "101982", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/101982" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://doc.powerdns.com/recursor/security-advisories/powerdns-advisory-2017-05.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "PowerDNS Recursor", "vendor": "PowerDNS", "versions": [ { "status": "affected", "version": "from 4.0.0 up to and including 4.0.6" } ] } ], "datePublic": "2017-11-27T00:00:00", "descriptions": [ { "lang": "en", "value": "A cross-site scripting issue has been found in the web interface of PowerDNS Recursor from 4.0.0 up to and including 4.0.6, where the qname of DNS queries was displayed without any escaping, allowing a remote attacker to inject HTML and Javascript code into the web interface, altering the content." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2018-01-24T10:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "101982", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/101982" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://doc.powerdns.com/recursor/security-advisories/powerdns-advisory-2017-05.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "DATE_PUBLIC": "2017-11-27T00:00:00", "ID": "CVE-2017-15092", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "PowerDNS Recursor", "version": { "version_data": [ { "version_value": "from 4.0.0 up to and including 4.0.6" } ] } } ] }, "vendor_name": "PowerDNS" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A cross-site scripting issue has been found in the web interface of PowerDNS Recursor from 4.0.0 up to and including 4.0.6, where the qname of DNS queries was displayed without any escaping, allowing a remote attacker to inject HTML and Javascript code into the web interface, altering the content." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-79" } ] } ] }, "references": { "reference_data": [ { "name": "101982", "refsource": "BID", "url": "http://www.securityfocus.com/bid/101982" }, { "name": "https://doc.powerdns.com/recursor/security-advisories/powerdns-advisory-2017-05.html", "refsource": "CONFIRM", "url": "https://doc.powerdns.com/recursor/security-advisories/powerdns-advisory-2017-05.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2017-15092", "datePublished": "2018-01-23T15:00:00Z", "dateReserved": "2017-10-08T00:00:00", "dateUpdated": "2024-09-17T03:27:42.169Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-15093
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/101982 | vdb-entry, x_refsource_BID | |
https://doc.powerdns.com/recursor/security-advisories/powerdns-advisory-2017-06.html | x_refsource_CONFIRM |
Vendor | Product | Version | |
---|---|---|---|
▼ | PowerDNS | PowerDNS Recursor |
Version: 4.x up to and including 4.0.6 Version: 3.x up to and including 3.7.4 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T19:50:14.941Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "101982", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/101982" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://doc.powerdns.com/recursor/security-advisories/powerdns-advisory-2017-06.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "PowerDNS Recursor", "vendor": "PowerDNS", "versions": [ { "status": "affected", "version": "4.x up to and including 4.0.6" }, { "status": "affected", "version": "3.x up to and including 3.7.4" } ] } ], "datePublic": "2017-11-27T00:00:00", "descriptions": [ { "lang": "en", "value": "When api-config-dir is set to a non-empty value, which is not the case by default, the API in PowerDNS Recursor 4.x up to and including 4.0.6 and 3.x up to and including 3.7.4 allows an authorized user to update the Recursor\u0027s ACL by adding and removing netmasks, and to configure forward zones. It was discovered that the new netmask and IP addresses of forwarded zones were not sufficiently validated, allowing an authenticated user to inject new configuration directives into the Recursor\u0027s configuration." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2018-01-24T10:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "101982", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/101982" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://doc.powerdns.com/recursor/security-advisories/powerdns-advisory-2017-06.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "DATE_PUBLIC": "2017-11-27T00:00:00", "ID": "CVE-2017-15093", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "PowerDNS Recursor", "version": { "version_data": [ { "version_value": "4.x up to and including 4.0.6" }, { "version_value": "3.x up to and including 3.7.4" } ] } } ] }, "vendor_name": "PowerDNS" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "When api-config-dir is set to a non-empty value, which is not the case by default, the API in PowerDNS Recursor 4.x up to and including 4.0.6 and 3.x up to and including 3.7.4 allows an authorized user to update the Recursor\u0027s ACL by adding and removing netmasks, and to configure forward zones. It was discovered that the new netmask and IP addresses of forwarded zones were not sufficiently validated, allowing an authenticated user to inject new configuration directives into the Recursor\u0027s configuration." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-20" } ] } ] }, "references": { "reference_data": [ { "name": "101982", "refsource": "BID", "url": "http://www.securityfocus.com/bid/101982" }, { "name": "https://doc.powerdns.com/recursor/security-advisories/powerdns-advisory-2017-06.html", "refsource": "CONFIRM", "url": "https://doc.powerdns.com/recursor/security-advisories/powerdns-advisory-2017-06.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2017-15093", "datePublished": "2018-01-23T15:00:00Z", "dateReserved": "2017-10-08T00:00:00", "dateUpdated": "2024-09-17T00:35:38.803Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-14644
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2018-07.html | x_refsource_CONFIRM | |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14644 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T09:38:12.991Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2018-07.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14644" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "pdns", "vendor": "[UNKNOWN]", "versions": [ { "status": "affected", "version": "4.0.9" }, { "status": "affected", "version": "4.1.5" } ] } ], "datePublic": "2018-11-09T00:00:00", "descriptions": [ { "lang": "en", "value": "An issue has been found in PowerDNS Recursor from 4.0.0 up to and including 4.1.4. A remote attacker sending a DNS query for a meta-type like OPT can lead to a zone being wrongly cached as failing DNSSEC validation. It only arises if the parent zone is signed, and all the authoritative servers for that parent zone answer with FORMERR to a query for at least one of the meta-types. As a result, subsequent queries from clients requesting DNSSEC validation will be answered with a ServFail." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2018-11-09T18:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2018-07.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14644" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2018-14644", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "pdns", "version": { "version_data": [ { "version_value": "4.0.9" }, { "version_value": "4.1.5" } ] } } ] }, "vendor_name": "[UNKNOWN]" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue has been found in PowerDNS Recursor from 4.0.0 up to and including 4.1.4. A remote attacker sending a DNS query for a meta-type like OPT can lead to a zone being wrongly cached as failing DNSSEC validation. It only arises if the parent zone is signed, and all the authoritative servers for that parent zone answer with FORMERR to a query for at least one of the meta-types. As a result, subsequent queries from clients requesting DNSSEC validation will be answered with a ServFail." } ] }, "impact": { "cvss": [ [ { "vectorString": "5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" } ] ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-20" } ] } ] }, "references": { "reference_data": [ { "name": "https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2018-07.html", "refsource": "CONFIRM", "url": "https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2018-07.html" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14644", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14644" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2018-14644", "datePublished": "2018-11-09T19:00:00", "dateReserved": "2018-07-27T00:00:00", "dateUpdated": "2024-08-05T09:38:12.991Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2016-7068
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-7068 | x_refsource_CONFIRM | |
https://www.debian.org/security/2017/dsa-3764 | vendor-advisory, x_refsource_DEBIAN | |
https://www.debian.org/security/2017/dsa-3763 | vendor-advisory, x_refsource_DEBIAN | |
https://doc.powerdns.com/md/security/powerdns-advisory-2016-02/ | x_refsource_CONFIRM |
Vendor | Product | Version | |
---|---|---|---|
▼ | Open-Xchange | pdns |
Version: 3.4.11 Version: 4.0.2 Version: 3.7.4 Version: 4.0.4 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T01:50:47.232Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-7068" }, { "name": "DSA-3764", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2017/dsa-3764" }, { "name": "DSA-3763", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2017/dsa-3763" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://doc.powerdns.com/md/security/powerdns-advisory-2016-02/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "pdns", "vendor": "Open-Xchange", "versions": [ { "status": "affected", "version": "3.4.11" }, { "status": "affected", "version": "4.0.2" }, { "status": "affected", "version": "3.7.4" }, { "status": "affected", "version": "4.0.4" } ] } ], "datePublic": "2016-12-15T00:00:00", "descriptions": [ { "lang": "en", "value": "An issue has been found in PowerDNS before 3.4.11 and 4.0.2, and PowerDNS recursor before 3.7.4 and 4.0.4, allowing a remote, unauthenticated attacker to cause an abnormal CPU usage load on the PowerDNS server by sending crafted DNS queries, which might result in a partial denial of service if the system becomes overloaded. This issue is based on the fact that the PowerDNS server parses all records present in a query regardless of whether they are needed or even legitimate. A specially crafted query containing a large number of records can be used to take advantage of that behaviour." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2018-09-12T09:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-7068" }, { "name": "DSA-3764", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2017/dsa-3764" }, { "name": "DSA-3763", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2017/dsa-3763" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://doc.powerdns.com/md/security/powerdns-advisory-2016-02/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2016-7068", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "pdns", "version": { "version_data": [ { "version_value": "3.4.11" }, { "version_value": "4.0.2" }, { "version_value": "3.7.4" }, { "version_value": "4.0.4" } ] } } ] }, "vendor_name": "Open-Xchange" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue has been found in PowerDNS before 3.4.11 and 4.0.2, and PowerDNS recursor before 3.7.4 and 4.0.4, allowing a remote, unauthenticated attacker to cause an abnormal CPU usage load on the PowerDNS server by sending crafted DNS queries, which might result in a partial denial of service if the system becomes overloaded. This issue is based on the fact that the PowerDNS server parses all records present in a query regardless of whether they are needed or even legitimate. A specially crafted query containing a large number of records can be used to take advantage of that behaviour." } ] }, "impact": { "cvss": [ [ { "vectorString": "5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" } ] ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-20" } ] } ] }, "references": { "reference_data": [ { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-7068", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-7068" }, { "name": "DSA-3764", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2017/dsa-3764" }, { "name": "DSA-3763", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2017/dsa-3763" }, { "name": "https://doc.powerdns.com/md/security/powerdns-advisory-2016-02/", "refsource": "CONFIRM", "url": "https://doc.powerdns.com/md/security/powerdns-advisory-2016-02/" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2016-7068", "datePublished": "2018-09-11T13:00:00", "dateReserved": "2016-08-23T00:00:00", "dateUpdated": "2024-08-06T01:50:47.232Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2016-7074
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-7074 | x_refsource_CONFIRM | |
https://www.debian.org/security/2017/dsa-3764 | vendor-advisory, x_refsource_DEBIAN | |
https://doc.powerdns.com/md/security/powerdns-advisory-2016-04/ | x_refsource_CONFIRM |
Vendor | Product | Version | |
---|---|---|---|
▼ | Open-Xchange | pdns |
Version: 3.4.11 Version: 4.0.2 Version: 4.0.4 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T01:50:47.469Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-7074" }, { "name": "DSA-3764", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2017/dsa-3764" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://doc.powerdns.com/md/security/powerdns-advisory-2016-04/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "pdns", "vendor": "Open-Xchange", "versions": [ { "status": "affected", "version": "3.4.11" }, { "status": "affected", "version": "4.0.2" }, { "status": "affected", "version": "4.0.4" } ] } ], "datePublic": "2016-12-15T00:00:00", "descriptions": [ { "lang": "en", "value": "An issue has been found in PowerDNS before 3.4.11 and 4.0.2, and PowerDNS recursor before 4.0.4, allowing an attacker in position of man-in-the-middle to alter the content of an AXFR because of insufficient validation of TSIG signatures. A missing check that the TSIG record is the last one, leading to the possibility of parsing records that are not covered by the TSIG signature." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2018-09-12T09:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-7074" }, { "name": "DSA-3764", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2017/dsa-3764" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://doc.powerdns.com/md/security/powerdns-advisory-2016-04/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2016-7074", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "pdns", "version": { "version_data": [ { "version_value": "3.4.11" }, { "version_value": "4.0.2" }, { "version_value": "4.0.4" } ] } } ] }, "vendor_name": "Open-Xchange" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue has been found in PowerDNS before 3.4.11 and 4.0.2, and PowerDNS recursor before 4.0.4, allowing an attacker in position of man-in-the-middle to alter the content of an AXFR because of insufficient validation of TSIG signatures. A missing check that the TSIG record is the last one, leading to the possibility of parsing records that are not covered by the TSIG signature." } ] }, "impact": { "cvss": [ [ { "vectorString": "5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" } ] ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-20" } ] } ] }, "references": { "reference_data": [ { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-7074", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-7074" }, { "name": "DSA-3764", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2017/dsa-3764" }, { "name": "https://doc.powerdns.com/md/security/powerdns-advisory-2016-04/", "refsource": "CONFIRM", "url": "https://doc.powerdns.com/md/security/powerdns-advisory-2016-04/" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2016-7074", "datePublished": "2018-09-11T13:00:00", "dateReserved": "2016-08-23T00:00:00", "dateUpdated": "2024-08-06T01:50:47.469Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2009-4010
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://www.redhat.com/archives/fedora-package-announce/2010-January/msg00217.html | vendor-advisory, x_refsource_FEDORA | |
http://doc.powerdns.com/powerdns-advisory-2010-02.html | x_refsource_CONFIRM | |
http://www.securityfocus.com/archive/1/508743/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://securitytracker.com/id?1023404 | vdb-entry, x_refsource_SECTRACK | |
https://bugzilla.redhat.com/show_bug.cgi?id=552285 | x_refsource_CONFIRM | |
http://secunia.com/advisories/38004 | third-party-advisory, x_refsource_SECUNIA | |
https://www.redhat.com/archives/fedora-package-announce/2010-January/msg00228.html | vendor-advisory, x_refsource_FEDORA | |
http://secunia.com/advisories/38068 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securityfocus.com/bid/37653 | vdb-entry, x_refsource_BID | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/55439 | vdb-entry, x_refsource_XF | |
http://www.vupen.com/english/advisories/2010/0054 | vdb-entry, x_refsource_VUPEN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T06:45:50.898Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "FEDORA-2010-0209", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2010-January/msg00217.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://doc.powerdns.com/powerdns-advisory-2010-02.html" }, { "name": "20100106 Critical PowerDNS Recursor Security Vulnerabilities: please upgrade ASAP to 3.1.7.2", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/508743/100/0/threaded" }, { "name": "1023404", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1023404" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=552285" }, { "name": "38004", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/38004" }, { "name": "FEDORA-2010-0228", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2010-January/msg00228.html" }, { "name": "38068", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/38068" }, { "name": "37653", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/37653" }, { "name": "powerdns-zones-spoofing(55439)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/55439" }, { "name": "ADV-2010-0054", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/0054" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-01-06T00:00:00", "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in PowerDNS Recursor before 3.1.7.2 allows remote attackers to spoof DNS data via crafted zones." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-10T18:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "FEDORA-2010-0209", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2010-January/msg00217.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://doc.powerdns.com/powerdns-advisory-2010-02.html" }, { "name": "20100106 Critical PowerDNS Recursor Security Vulnerabilities: please upgrade ASAP to 3.1.7.2", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/508743/100/0/threaded" }, { "name": "1023404", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1023404" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=552285" }, { "name": "38004", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/38004" }, { "name": "FEDORA-2010-0228", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2010-January/msg00228.html" }, { "name": "38068", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/38068" }, { "name": "37653", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/37653" }, { "name": "powerdns-zones-spoofing(55439)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/55439" }, { "name": "ADV-2010-0054", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/0054" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2009-4010", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unspecified vulnerability in PowerDNS Recursor before 3.1.7.2 allows remote attackers to spoof DNS data via crafted zones." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "FEDORA-2010-0209", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2010-January/msg00217.html" }, { "name": "http://doc.powerdns.com/powerdns-advisory-2010-02.html", "refsource": "CONFIRM", "url": "http://doc.powerdns.com/powerdns-advisory-2010-02.html" }, { "name": "20100106 Critical PowerDNS Recursor Security Vulnerabilities: please upgrade ASAP to 3.1.7.2", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/508743/100/0/threaded" }, { "name": "1023404", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1023404" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=552285", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=552285" }, { "name": "38004", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/38004" }, { "name": "FEDORA-2010-0228", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2010-January/msg00228.html" }, { "name": "38068", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/38068" }, { "name": "37653", "refsource": "BID", "url": "http://www.securityfocus.com/bid/37653" }, { "name": "powerdns-zones-spoofing(55439)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/55439" }, { "name": "ADV-2010-0054", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2010/0054" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2009-4010", "datePublished": "2010-01-08T17:00:00", "dateReserved": "2009-11-19T00:00:00", "dateUpdated": "2024-08-07T06:45:50.898Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-25829
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2020-07.html | x_refsource_CONFIRM | |
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00036.html | vendor-advisory, x_refsource_SUSE | |
https://security.gentoo.org/glsa/202012-19 | vendor-advisory, x_refsource_GENTOO |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T15:40:36.998Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2020-07.html" }, { "name": "openSUSE-SU-2020:1687", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00036.html" }, { "name": "GLSA-202012-19", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202012-19" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue has been found in PowerDNS Recursor before 4.1.18, 4.2.x before 4.2.5, and 4.3.x before 4.3.5. A remote attacker can cause the cached records for a given name to be updated to the Bogus DNSSEC validation state, instead of their actual DNSSEC Secure state, via a DNS ANY query. This results in a denial of service for installation that always validate (dnssec=validate), and for clients requesting validation when on-demand validation is enabled (dnssec=process)." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-12-23T21:06:15", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2020-07.html" }, { "name": "openSUSE-SU-2020:1687", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00036.html" }, { "name": "GLSA-202012-19", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/202012-19" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-25829", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue has been found in PowerDNS Recursor before 4.1.18, 4.2.x before 4.2.5, and 4.3.x before 4.3.5. A remote attacker can cause the cached records for a given name to be updated to the Bogus DNSSEC validation state, instead of their actual DNSSEC Secure state, via a DNS ANY query. This results in a denial of service for installation that always validate (dnssec=validate), and for clients requesting validation when on-demand validation is enabled (dnssec=process)." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2020-07.html", "refsource": "CONFIRM", "url": "https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2020-07.html" }, { "name": "openSUSE-SU-2020:1687", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00036.html" }, { "name": "GLSA-202012-19", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/202012-19" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-25829", "datePublished": "2020-10-16T05:07:44", "dateReserved": "2020-09-23T00:00:00", "dateUpdated": "2024-08-04T15:40:36.998Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-14626
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14626 | x_refsource_CONFIRM | |
https://doc.powerdns.com/recursor/security-advisories/powerdns-advisory-2018-06.html | x_refsource_CONFIRM | |
https://doc.powerdns.com/authoritative/security-advisories/powerdns-advisory-2018-05.html | x_refsource_CONFIRM |
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | The PowerDNS Project | pdns |
Version: 4.1.0 to 4.1.4 inclusive |
||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T09:29:51.834Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14626" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://doc.powerdns.com/recursor/security-advisories/powerdns-advisory-2018-06.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://doc.powerdns.com/authoritative/security-advisories/powerdns-advisory-2018-05.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "pdns", "vendor": "The PowerDNS Project", "versions": [ { "status": "affected", "version": "4.1.0 to 4.1.4 inclusive" } ] }, { "product": "pdns-recursor", "vendor": "The PowerDNS Project", "versions": [ { "status": "affected", "version": "4.0.0 to 4.1.4 inclusive" } ] } ], "datePublic": "2018-11-06T00:00:00", "descriptions": [ { "lang": "en", "value": "PowerDNS Authoritative Server 4.1.0 up to 4.1.4 inclusive and PowerDNS Recursor 4.0.0 up to 4.1.4 inclusive are vulnerable to a packet cache pollution via crafted query that can lead to denial of service." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-400", "description": "CWE-400", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2018-11-29T17:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14626" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://doc.powerdns.com/recursor/security-advisories/powerdns-advisory-2018-06.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://doc.powerdns.com/authoritative/security-advisories/powerdns-advisory-2018-05.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2018-14626", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "pdns", "version": { "version_data": [ { "version_value": "4.1.0 to 4.1.4 inclusive" } ] } }, { "product_name": "pdns-recursor", "version": { "version_data": [ { "version_value": "4.0.0 to 4.1.4 inclusive" } ] } } ] }, "vendor_name": "The PowerDNS Project" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "PowerDNS Authoritative Server 4.1.0 up to 4.1.4 inclusive and PowerDNS Recursor 4.0.0 up to 4.1.4 inclusive are vulnerable to a packet cache pollution via crafted query that can lead to denial of service." } ] }, "impact": { "cvss": [ [ { "vectorString": "5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" } ] ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-400" } ] } ] }, "references": { "reference_data": [ { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14626", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14626" }, { "name": "https://doc.powerdns.com/recursor/security-advisories/powerdns-advisory-2018-06.html", "refsource": "CONFIRM", "url": "https://doc.powerdns.com/recursor/security-advisories/powerdns-advisory-2018-06.html" }, { "name": "https://doc.powerdns.com/authoritative/security-advisories/powerdns-advisory-2018-05.html", "refsource": "CONFIRM", "url": "https://doc.powerdns.com/authoritative/security-advisories/powerdns-advisory-2018-05.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2018-14626", "datePublished": "2018-11-29T18:00:00", "dateReserved": "2018-07-27T00:00:00", "dateUpdated": "2024-08-05T09:29:51.834Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-14196
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://www.openwall.com/lists/oss-security/2020/07/01/1 | x_refsource_CONFIRM | |
https://doc.powerdns.com/recursor/security-advisories/powerdns-advisory-2020-04.html | x_refsource_CONFIRM | |
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00043.html | vendor-advisory, x_refsource_SUSE | |
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00044.html | vendor-advisory, x_refsource_SUSE | |
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00042.html | vendor-advisory, x_refsource_SUSE | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7TUNCUZNASYSTVD35QGFAI6XO2BFMQ2F/ | vendor-advisory, x_refsource_FEDORA | |
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00036.html | vendor-advisory, x_refsource_SUSE |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T12:39:36.252Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.openwall.com/lists/oss-security/2020/07/01/1" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://doc.powerdns.com/recursor/security-advisories/powerdns-advisory-2020-04.html" }, { "name": "openSUSE-SU-2020:1005", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00043.html" }, { "name": "openSUSE-SU-2020:1101", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00044.html" }, { "name": "openSUSE-SU-2020:1055", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00042.html" }, { "name": "FEDORA-2020-1d812d5546", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7TUNCUZNASYSTVD35QGFAI6XO2BFMQ2F/" }, { "name": "openSUSE-SU-2020:1687", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00036.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "In PowerDNS Recursor versions up to and including 4.3.1, 4.2.2 and 4.1.16, the ACL restricting access to the internal web server is not properly enforced." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-10-17T20:06:12", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.openwall.com/lists/oss-security/2020/07/01/1" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://doc.powerdns.com/recursor/security-advisories/powerdns-advisory-2020-04.html" }, { "name": "openSUSE-SU-2020:1005", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00043.html" }, { "name": "openSUSE-SU-2020:1101", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00044.html" }, { "name": "openSUSE-SU-2020:1055", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00042.html" }, { "name": "FEDORA-2020-1d812d5546", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7TUNCUZNASYSTVD35QGFAI6XO2BFMQ2F/" }, { "name": "openSUSE-SU-2020:1687", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00036.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-14196", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In PowerDNS Recursor versions up to and including 4.3.1, 4.2.2 and 4.1.16, the ACL restricting access to the internal web server is not properly enforced." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.openwall.com/lists/oss-security/2020/07/01/1", "refsource": "CONFIRM", "url": "https://www.openwall.com/lists/oss-security/2020/07/01/1" }, { "name": "https://doc.powerdns.com/recursor/security-advisories/powerdns-advisory-2020-04.html", "refsource": "CONFIRM", "url": "https://doc.powerdns.com/recursor/security-advisories/powerdns-advisory-2020-04.html" }, { "name": "openSUSE-SU-2020:1005", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00043.html" }, { "name": "openSUSE-SU-2020:1101", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00044.html" }, { "name": "openSUSE-SU-2020:1055", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00042.html" }, { "name": "FEDORA-2020-1d812d5546", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7TUNCUZNASYSTVD35QGFAI6XO2BFMQ2F/" }, { "name": "openSUSE-SU-2020:1687", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00036.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-14196", "datePublished": "2020-07-01T17:03:04", "dateReserved": "2020-06-16T00:00:00", "dateUpdated": "2024-08-04T12:39:36.252Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-50387
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T22:16:46.692Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.athene-center.de/aktuelles/key-trap" }, { "tags": [ "x_transferred" ], "url": "https://nlnetlabs.nl/news/2024/Feb/13/unbound-1.19.1-released/" }, { "tags": [ "x_transferred" ], "url": "https://kb.isc.org/docs/cve-2023-50387" }, { "tags": [ "x_transferred" ], "url": "https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2024-01.html" }, { "tags": [ "x_transferred" ], "url": "https://www.theregister.com/2024/02/13/dnssec_vulnerability_internet/" }, { "tags": [ "x_transferred" ], "url": "https://news.ycombinator.com/item?id=39367411" }, { "tags": [ "x_transferred" ], "url": "https://www.securityweek.com/keytrap-dns-attack-could-disable-large-parts-of-internet-researchers/" }, { "tags": [ "x_transferred" ], "url": "https://www.isc.org/blogs/2024-bind-security-release/" }, { "tags": [ "x_transferred" ], "url": "https://news.ycombinator.com/item?id=39372384" }, { "tags": [ "x_transferred" ], "url": "https://gitlab.nic.cz/knot/knot-resolver/-/releases/v5.7.1" }, { "tags": [ "x_transferred" ], "url": "https://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2024q1/017430.html" }, { "tags": [ "x_transferred" ], "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-50387" }, { "tags": [ "x_transferred" ], "url": "https://access.redhat.com/security/cve/CVE-2023-50387" }, { "tags": [ "x_transferred" ], "url": "https://bugzilla.suse.com/show_bug.cgi?id=1219823" }, { "tags": [ "x_transferred" ], "url": "https://www.athene-center.de/fileadmin/content/PDF/Technical_Report_KeyTrap.pdf" }, { "name": "[oss-security] 20240216 Re: Unbound: disclosure of CVE-2023-50387 and CVE-2023-50868 DNSSEC validation vulnerabilities", "tags": [ "mailing-list", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2024/02/16/2" }, { "name": "[oss-security] 20240216 Re: Unbound: disclosure of CVE-2023-50387 and CVE-2023-50868 DNSSEC validation vulnerabilities", "tags": [ "mailing-list", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2024/02/16/3" }, { "name": "FEDORA-2024-2e26eccfcb", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SVYA42BLXUCIDLD35YIJPJSHDIADNYMP/" }, { "name": "FEDORA-2024-e24211eff0", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BUIP7T7Z4T3UHLXFWG6XIVDP4GYPD3AI/" }, { "name": "FEDORA-2024-21310568fa", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PNNHZSZPG2E7NBMBNYPGHCFI4V4XRWNQ/" }, { "name": "[debian-lts-announce] 20240221 [SECURITY] [DLA 3736-1] unbound security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2024/02/msg00006.html" }, { "name": "FEDORA-2024-b0f9656a76", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TEXGOYGW7DBS3N2QSSQONZ4ENIRQEAPG/" }, { "name": "FEDORA-2024-4e36df9dfd", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UQESRWMJCF4JEYJEAKLRM6CT55GLJAB7/" }, { "name": "FEDORA-2024-499b9be35f", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RGS7JN6FZXUSTC2XKQHH27574XOULYYJ/" }, { "name": "FEDORA-2024-c36c448396", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HVRDSJVZKMCXKKPP6PNR62T7RWZ3YSDZ/" }, { "name": "FEDORA-2024-c967c7d287", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6FV5O347JTX7P5OZA6NGO4MKTXRXMKOZ/" }, { "name": "FEDORA-2024-e00eceb11c", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IGSLGKUAQTW5JPPZCMF5YPEYALLRUZZ6/" }, { "name": "FEDORA-2024-fae88b73eb", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZDZFMEKQTZ4L7RY46FCENWFB5MDT263R/" }, { "tags": [ "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20240307-0007/" }, { "name": "[debian-lts-announce] 20240517 [SECURITY] [DLA 3816-1] bind9 security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2024/05/msg00011.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Certain DNSSEC aspects of the DNS protocol (in RFC 4033, 4034, 4035, 6840, and related RFCs) allow remote attackers to cause a denial of service (CPU consumption) via one or more DNSSEC responses, aka the \"KeyTrap\" issue. One of the concerns is that, when there is a zone with many DNSKEY and RRSIG records, the protocol specification implies that an algorithm must evaluate all combinations of DNSKEY and RRSIG records." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2024-06-10T16:14:16.780094", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://www.athene-center.de/aktuelles/key-trap" }, { "url": "https://nlnetlabs.nl/news/2024/Feb/13/unbound-1.19.1-released/" }, { "url": "https://kb.isc.org/docs/cve-2023-50387" }, { "url": "https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2024-01.html" }, { "url": "https://www.theregister.com/2024/02/13/dnssec_vulnerability_internet/" }, { "url": "https://news.ycombinator.com/item?id=39367411" }, { "url": "https://www.securityweek.com/keytrap-dns-attack-could-disable-large-parts-of-internet-researchers/" }, { "url": "https://www.isc.org/blogs/2024-bind-security-release/" }, { "url": "https://news.ycombinator.com/item?id=39372384" }, { "url": "https://gitlab.nic.cz/knot/knot-resolver/-/releases/v5.7.1" }, { "url": "https://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2024q1/017430.html" }, { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-50387" }, { "url": "https://access.redhat.com/security/cve/CVE-2023-50387" }, { "url": "https://bugzilla.suse.com/show_bug.cgi?id=1219823" }, { "url": "https://www.athene-center.de/fileadmin/content/PDF/Technical_Report_KeyTrap.pdf" }, { "name": "[oss-security] 20240216 Re: Unbound: disclosure of CVE-2023-50387 and CVE-2023-50868 DNSSEC validation vulnerabilities", "tags": [ "mailing-list" ], "url": "http://www.openwall.com/lists/oss-security/2024/02/16/2" }, { "name": "[oss-security] 20240216 Re: Unbound: disclosure of CVE-2023-50387 and CVE-2023-50868 DNSSEC validation vulnerabilities", "tags": [ "mailing-list" ], "url": "http://www.openwall.com/lists/oss-security/2024/02/16/3" }, { "name": "FEDORA-2024-2e26eccfcb", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SVYA42BLXUCIDLD35YIJPJSHDIADNYMP/" }, { "name": "FEDORA-2024-e24211eff0", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BUIP7T7Z4T3UHLXFWG6XIVDP4GYPD3AI/" }, { "name": "FEDORA-2024-21310568fa", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PNNHZSZPG2E7NBMBNYPGHCFI4V4XRWNQ/" }, { "name": "[debian-lts-announce] 20240221 [SECURITY] [DLA 3736-1] unbound security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2024/02/msg00006.html" }, { "name": "FEDORA-2024-b0f9656a76", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TEXGOYGW7DBS3N2QSSQONZ4ENIRQEAPG/" }, { "name": "FEDORA-2024-4e36df9dfd", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UQESRWMJCF4JEYJEAKLRM6CT55GLJAB7/" }, { "name": "FEDORA-2024-499b9be35f", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RGS7JN6FZXUSTC2XKQHH27574XOULYYJ/" }, { "name": "FEDORA-2024-c36c448396", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HVRDSJVZKMCXKKPP6PNR62T7RWZ3YSDZ/" }, { "name": "FEDORA-2024-c967c7d287", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6FV5O347JTX7P5OZA6NGO4MKTXRXMKOZ/" }, { "name": "FEDORA-2024-e00eceb11c", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IGSLGKUAQTW5JPPZCMF5YPEYALLRUZZ6/" }, { "name": "FEDORA-2024-fae88b73eb", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZDZFMEKQTZ4L7RY46FCENWFB5MDT263R/" }, { "url": "https://security.netapp.com/advisory/ntap-20240307-0007/" }, { "name": "[debian-lts-announce] 20240517 [SECURITY] [DLA 3816-1] bind9 security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2024/05/msg00011.html" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2023-50387", "datePublished": "2024-02-14T00:00:00", "dateReserved": "2023-12-07T00:00:00", "dateUpdated": "2024-08-02T22:16:46.692Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-27227
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T05:25:32.569Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://docs.powerdns.com/recursor/security-advisories/index.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://doc.powerdns.com/authoritative/security-advisories/index.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2022-01.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://doc.powerdns.com/authoritative/security-advisories/powerdns-advisory-2022-01.html" }, { "name": "[oss-security] 20220325 Security Advisory 2022-01 for PowerDNS Authoritative Server 4.4.2, 4.5.3, 4.6.0 and PowerDNS Recursor 4.4.7, 4.5.7, 4.6.0", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2022/03/25/1" }, { "name": "FEDORA-2022-8367cefdea", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2QKN56VWXUVFOYGUN75N5IRNK66OHTHT/" }, { "name": "FEDORA-2022-6e19acf414", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HEABZA46XYEUWMGSY2GYYVHISBVWEHIO/" }, { "name": "FEDORA-2022-1df2a841e4", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZJSKICB67SPPEGNXCQLZVSWR6QGCN3KP/" }, { "name": "FEDORA-2022-ccfd5d1045", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IPHOFNI7FKM5NNOVDOWO4TBXFAFICCUE/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "In PowerDNS Authoritative Server before 4.4.3, 4.5.x before 4.5.4, and 4.6.x before 4.6.1 and PowerDNS Recursor before 4.4.8, 4.5.x before 4.5.8, and 4.6.x before 4.6.1, insufficient validation of an IXFR end condition causes incomplete zone transfers to be handled as successful transfers." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-07T07:06:17", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://docs.powerdns.com/recursor/security-advisories/index.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://doc.powerdns.com/authoritative/security-advisories/index.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2022-01.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://doc.powerdns.com/authoritative/security-advisories/powerdns-advisory-2022-01.html" }, { "name": "[oss-security] 20220325 Security Advisory 2022-01 for PowerDNS Authoritative Server 4.4.2, 4.5.3, 4.6.0 and PowerDNS Recursor 4.4.7, 4.5.7, 4.6.0", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2022/03/25/1" }, { "name": "FEDORA-2022-8367cefdea", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2QKN56VWXUVFOYGUN75N5IRNK66OHTHT/" }, { "name": "FEDORA-2022-6e19acf414", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HEABZA46XYEUWMGSY2GYYVHISBVWEHIO/" }, { "name": "FEDORA-2022-1df2a841e4", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZJSKICB67SPPEGNXCQLZVSWR6QGCN3KP/" }, { "name": "FEDORA-2022-ccfd5d1045", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IPHOFNI7FKM5NNOVDOWO4TBXFAFICCUE/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2022-27227", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In PowerDNS Authoritative Server before 4.4.3, 4.5.x before 4.5.4, and 4.6.x before 4.6.1 and PowerDNS Recursor before 4.4.8, 4.5.x before 4.5.8, and 4.6.x before 4.6.1, insufficient validation of an IXFR end condition causes incomplete zone transfers to be handled as successful transfers." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://docs.powerdns.com/recursor/security-advisories/index.html", "refsource": "MISC", "url": "https://docs.powerdns.com/recursor/security-advisories/index.html" }, { "name": "https://doc.powerdns.com/authoritative/security-advisories/index.html", "refsource": "MISC", "url": "https://doc.powerdns.com/authoritative/security-advisories/index.html" }, { "name": "https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2022-01.html", "refsource": "CONFIRM", "url": "https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2022-01.html" }, { "name": "https://doc.powerdns.com/authoritative/security-advisories/powerdns-advisory-2022-01.html", "refsource": "CONFIRM", "url": "https://doc.powerdns.com/authoritative/security-advisories/powerdns-advisory-2022-01.html" }, { "name": "[oss-security] 20220325 Security Advisory 2022-01 for PowerDNS Authoritative Server 4.4.2, 4.5.3, 4.6.0 and PowerDNS Recursor 4.4.7, 4.5.7, 4.6.0", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2022/03/25/1" }, { "name": "FEDORA-2022-8367cefdea", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2QKN56VWXUVFOYGUN75N5IRNK66OHTHT/" }, { "name": "FEDORA-2022-6e19acf414", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HEABZA46XYEUWMGSY2GYYVHISBVWEHIO/" }, { "name": "FEDORA-2022-1df2a841e4", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZJSKICB67SPPEGNXCQLZVSWR6QGCN3KP/" }, { "name": "FEDORA-2022-ccfd5d1045", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IPHOFNI7FKM5NNOVDOWO4TBXFAFICCUE/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2022-27227", "datePublished": "2022-03-25T14:41:44", "dateReserved": "2022-03-17T00:00:00", "dateUpdated": "2024-08-03T05:25:32.569Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2006-4252
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.vupen.com/english/advisories/2006/4484 | vdb-entry, x_refsource_VUPEN | |
http://doc.powerdns.com/powerdns-advisory-2006-02.html | x_refsource_CONFIRM | |
http://secunia.com/advisories/22824 | third-party-advisory, x_refsource_SECUNIA | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/30257 | vdb-entry, x_refsource_XF | |
http://lists.suse.com/archive/suse-security-announce/2006-Nov/0007.html | vendor-advisory, x_refsource_SUSE | |
http://www.securityfocus.com/bid/21037 | vdb-entry, x_refsource_BID | |
http://secunia.com/advisories/22976 | third-party-advisory, x_refsource_SECUNIA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T19:06:06.841Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "ADV-2006-4484", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2006/4484" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://doc.powerdns.com/powerdns-advisory-2006-02.html" }, { "name": "22824", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/22824" }, { "name": "powerdns-cname-bo(30257)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30257" }, { "name": "SUSE-SA:2006:070", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.suse.com/archive/suse-security-announce/2006-Nov/0007.html" }, { "name": "21037", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/21037" }, { "name": "22976", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/22976" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2006-11-13T00:00:00", "descriptions": [ { "lang": "en", "value": "PowerDNS Recursor 3.1.3 and earlier allows remote attackers to cause a denial of service (resource exhaustion and application crash) via a CNAME record with a zero TTL, which triggers an infinite loop." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-19T15:57:01", "orgId": "79363d38-fa19-49d1-9214-5f28da3f3ac5", "shortName": "debian" }, "references": [ { "name": "ADV-2006-4484", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2006/4484" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://doc.powerdns.com/powerdns-advisory-2006-02.html" }, { "name": "22824", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/22824" }, { "name": "powerdns-cname-bo(30257)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30257" }, { "name": "SUSE-SA:2006:070", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.suse.com/archive/suse-security-announce/2006-Nov/0007.html" }, { "name": "21037", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/21037" }, { "name": "22976", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/22976" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@debian.org", "ID": "CVE-2006-4252", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "PowerDNS Recursor 3.1.3 and earlier allows remote attackers to cause a denial of service (resource exhaustion and application crash) via a CNAME record with a zero TTL, which triggers an infinite loop." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "ADV-2006-4484", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2006/4484" }, { "name": "http://doc.powerdns.com/powerdns-advisory-2006-02.html", "refsource": "CONFIRM", "url": "http://doc.powerdns.com/powerdns-advisory-2006-02.html" }, { "name": "22824", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/22824" }, { "name": "powerdns-cname-bo(30257)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30257" }, { "name": "SUSE-SA:2006:070", "refsource": "SUSE", "url": "http://lists.suse.com/archive/suse-security-announce/2006-Nov/0007.html" }, { "name": "21037", "refsource": "BID", "url": "http://www.securityfocus.com/bid/21037" }, { "name": "22976", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/22976" } ] } } } }, "cveMetadata": { "assignerOrgId": "79363d38-fa19-49d1-9214-5f28da3f3ac5", "assignerShortName": "debian", "cveId": "CVE-2006-4252", "datePublished": "2006-11-14T20:00:00", "dateReserved": "2006-08-21T00:00:00", "dateUpdated": "2024-08-07T19:06:06.841Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-37428
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://docs.powerdns.com/recursor/lua-config/protobuf.html | x_refsource_MISC | |
https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2022-02.html | x_refsource_MISC | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FXSREJKTT6RNE3GXQENQ4R4HS37UNSPX/ | vendor-advisory, x_refsource_FEDORA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T10:29:21.028Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://docs.powerdns.com/recursor/lua-config/protobuf.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2022-02.html" }, { "name": "FEDORA-2022-d1dcd9b046", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FXSREJKTT6RNE3GXQENQ4R4HS37UNSPX/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "PowerDNS Recursor up to and including 4.5.9, 4.6.2 and 4.7.1, when protobuf logging is enabled, has Improper Cleanup upon a Thrown Exception, leading to a denial of service (daemon crash) via a DNS query that leads to an answer with specific properties." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AC:L/AV:N/A:H/C:N/I:N/PR:L/S:U/UI:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-01T11:06:17", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://docs.powerdns.com/recursor/lua-config/protobuf.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2022-02.html" }, { "name": "FEDORA-2022-d1dcd9b046", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FXSREJKTT6RNE3GXQENQ4R4HS37UNSPX/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2022-37428", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "PowerDNS Recursor up to and including 4.5.9, 4.6.2 and 4.7.1, when protobuf logging is enabled, has Improper Cleanup upon a Thrown Exception, leading to a denial of service (daemon crash) via a DNS query that leads to an answer with specific properties." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AC:L/AV:N/A:H/C:N/I:N/PR:L/S:U/UI:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://docs.powerdns.com/recursor/lua-config/protobuf.html", "refsource": "MISC", "url": "https://docs.powerdns.com/recursor/lua-config/protobuf.html" }, { "name": "https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2022-02.html", "refsource": "MISC", "url": "https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2022-02.html" }, { "name": "FEDORA-2022-d1dcd9b046", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FXSREJKTT6RNE3GXQENQ4R4HS37UNSPX/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2022-37428", "datePublished": "2022-08-23T16:33:04", "dateReserved": "2022-08-05T00:00:00", "dateUpdated": "2024-08-03T10:29:21.028Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-12244
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://doc.powerdns.com/recursor/security-advisories/powerdns-advisory-2020-02.html | x_refsource_CONFIRM | |
http://www.openwall.com/lists/oss-security/2020/05/19/3 | mailing-list, x_refsource_MLIST | |
https://www.debian.org/security/2020/dsa-4691 | vendor-advisory, x_refsource_DEBIAN | |
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00052.html | vendor-advisory, x_refsource_SUSE | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PS4ZN5XGENYNFKX7QIIOUCQQHXE37GJF/ | vendor-advisory, x_refsource_FEDORA | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NMP72NJGKBWR5WEBXAWX5KSLQUDFTG6S/ | vendor-advisory, x_refsource_FEDORA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T11:48:58.374Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://doc.powerdns.com/recursor/security-advisories/powerdns-advisory-2020-02.html" }, { "name": "[oss-security] 20200519 PowerDNS Recursor 4.3.1, 4.2.2. and 4.1.16 released fixing multiple vulnerabilities", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2020/05/19/3" }, { "name": "DSA-4691", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2020/dsa-4691" }, { "name": "openSUSE-SU-2020:0698", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00052.html" }, { "name": "FEDORA-2020-d9abb0c06d", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PS4ZN5XGENYNFKX7QIIOUCQQHXE37GJF/" }, { "name": "FEDORA-2020-c0ff3df740", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NMP72NJGKBWR5WEBXAWX5KSLQUDFTG6S/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue has been found in PowerDNS Recursor 4.1.0 through 4.3.0 where records in the answer section of a NXDOMAIN response lacking an SOA were not properly validated in SyncRes::processAnswer, allowing an attacker to bypass DNSSEC validation." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-06-14T18:06:08", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://doc.powerdns.com/recursor/security-advisories/powerdns-advisory-2020-02.html" }, { "name": "[oss-security] 20200519 PowerDNS Recursor 4.3.1, 4.2.2. and 4.1.16 released fixing multiple vulnerabilities", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2020/05/19/3" }, { "name": "DSA-4691", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2020/dsa-4691" }, { "name": "openSUSE-SU-2020:0698", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00052.html" }, { "name": "FEDORA-2020-d9abb0c06d", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PS4ZN5XGENYNFKX7QIIOUCQQHXE37GJF/" }, { "name": "FEDORA-2020-c0ff3df740", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NMP72NJGKBWR5WEBXAWX5KSLQUDFTG6S/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-12244", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue has been found in PowerDNS Recursor 4.1.0 through 4.3.0 where records in the answer section of a NXDOMAIN response lacking an SOA were not properly validated in SyncRes::processAnswer, allowing an attacker to bypass DNSSEC validation." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://doc.powerdns.com/recursor/security-advisories/powerdns-advisory-2020-02.html", "refsource": "CONFIRM", "url": "https://doc.powerdns.com/recursor/security-advisories/powerdns-advisory-2020-02.html" }, { "name": "[oss-security] 20200519 PowerDNS Recursor 4.3.1, 4.2.2. and 4.1.16 released fixing multiple vulnerabilities", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2020/05/19/3" }, { "name": "DSA-4691", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2020/dsa-4691" }, { "name": "openSUSE-SU-2020:0698", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00052.html" }, { "name": "FEDORA-2020-d9abb0c06d", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PS4ZN5XGENYNFKX7QIIOUCQQHXE37GJF/" }, { "name": "FEDORA-2020-c0ff3df740", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NMP72NJGKBWR5WEBXAWX5KSLQUDFTG6S/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-12244", "datePublished": "2020-05-19T13:51:39", "dateReserved": "2020-04-24T00:00:00", "dateUpdated": "2024-08-04T11:48:58.374Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-1868
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T04:54:16.393Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "FEDORA-2015-7079", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156648.html" }, { "name": "FEDORA-2015-7031", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156725.html" }, { "name": "FEDORA-2015-7018", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156743.html" }, { "name": "74306", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/74306" }, { "name": "FEDORA-2015-7033", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156655.html" }, { "name": "FEDORA-2015-7047", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156680.html" }, { "name": "DSA-3306", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2015/dsa-3306" }, { "name": "DSA-3307", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2015/dsa-3307" }, { "name": "1032220", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1032220" }, { "name": "FEDORA-2015-7057", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156667.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-04-23T00:00:00", "descriptions": [ { "lang": "en", "value": "The label decompression functionality in PowerDNS Recursor 3.5.x, 3.6.x before 3.6.3, and 3.7.x before 3.7.2 and Authoritative (Auth) Server 3.2.x, 3.3.x before 3.3.2, and 3.4.x before 3.4.4 allows remote attackers to cause a denial of service (CPU consumption or crash) via a request with a name that refers to itself." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-12-23T18:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "FEDORA-2015-7079", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156648.html" }, { "name": "FEDORA-2015-7031", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156725.html" }, { "name": "FEDORA-2015-7018", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156743.html" }, { "name": "74306", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/74306" }, { "name": "FEDORA-2015-7033", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156655.html" }, { "name": "FEDORA-2015-7047", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156680.html" }, { "name": "DSA-3306", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2015/dsa-3306" }, { "name": "DSA-3307", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2015/dsa-3307" }, { "name": "1032220", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1032220" }, { "name": "FEDORA-2015-7057", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156667.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2015-1868", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The label decompression functionality in PowerDNS Recursor 3.5.x, 3.6.x before 3.6.3, and 3.7.x before 3.7.2 and Authoritative (Auth) Server 3.2.x, 3.3.x before 3.3.2, and 3.4.x before 3.4.4 allows remote attackers to cause a denial of service (CPU consumption or crash) via a request with a name that refers to itself." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "FEDORA-2015-7079", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156648.html" }, { "name": "FEDORA-2015-7031", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156725.html" }, { "name": "FEDORA-2015-7018", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156743.html" }, { "name": "74306", "refsource": "BID", "url": "http://www.securityfocus.com/bid/74306" }, { "name": "FEDORA-2015-7033", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156655.html" }, { "name": "FEDORA-2015-7047", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156680.html" }, { "name": "DSA-3306", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2015/dsa-3306" }, { "name": "DSA-3307", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2015/dsa-3307" }, { "name": "1032220", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1032220" }, { "name": "FEDORA-2015-7057", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156667.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2015-1868", "datePublished": "2015-05-18T15:00:00", "dateReserved": "2015-02-17T00:00:00", "dateUpdated": "2024-08-06T04:54:16.393Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-3806
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2019-01.html | x_refsource_CONFIRM | |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3806 | x_refsource_CONFIRM |
Vendor | Product | Version | |
---|---|---|---|
▼ | Power DNS | pdns-recursor |
Version: versions after 4.1.3 before 4.1.9 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T19:19:18.319Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2019-01.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3806" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "pdns-recursor", "vendor": "Power DNS", "versions": [ { "status": "affected", "version": "versions after 4.1.3 before 4.1.9" } ] } ], "datePublic": "2019-01-21T00:00:00", "descriptions": [ { "lang": "en", "value": "An issue has been found in PowerDNS Recursor versions after 4.1.3 before 4.1.9 where Lua hooks are not properly applied to queries received over TCP in some specific combination of settings, possibly bypassing security policies enforced using Lua." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-358", "description": "CWE-358", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2019-01-29T16:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2019-01.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3806" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2019-3806", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "pdns-recursor", "version": { "version_data": [ { "version_value": "versions after 4.1.3 before 4.1.9" } ] } } ] }, "vendor_name": "Power DNS" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue has been found in PowerDNS Recursor versions after 4.1.3 before 4.1.9 where Lua hooks are not properly applied to queries received over TCP in some specific combination of settings, possibly bypassing security policies enforced using Lua." } ] }, "impact": { "cvss": [ [ { "vectorString": "5.4/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:H", "version": "3.0" } ] ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-358" } ] } ] }, "references": { "reference_data": [ { "name": "https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2019-01.html", "refsource": "CONFIRM", "url": "https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2019-01.html" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3806", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3806" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2019-3806", "datePublished": "2019-01-29T17:00:00", "dateReserved": "2019-01-03T00:00:00", "dateUpdated": "2024-08-04T19:19:18.319Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-16855
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16855 | x_refsource_CONFIRM | |
https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2018-09.html | x_refsource_MISC |
Vendor | Product | Version | |
---|---|---|---|
▼ | [UNKNOWN] | pdns-recursor |
Version: 4.1.8 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T10:32:54.074Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16855" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2018-09.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "pdns-recursor", "vendor": "[UNKNOWN]", "versions": [ { "status": "affected", "version": "4.1.8" } ] } ], "datePublic": "2018-11-26T00:00:00", "descriptions": [ { "lang": "en", "value": "An issue has been found in PowerDNS Recursor before version 4.1.8 where a remote attacker sending a DNS query can trigger an out-of-bounds memory read while computing the hash of the query for a packet cache lookup, possibly leading to a crash." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2018-12-03T13:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16855" }, { "tags": [ "x_refsource_MISC" ], "url": "https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2018-09.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2018-16855", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "pdns-recursor", "version": { "version_data": [ { "version_value": "4.1.8" } ] } } ] }, "vendor_name": "[UNKNOWN]" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue has been found in PowerDNS Recursor before version 4.1.8 where a remote attacker sending a DNS query can trigger an out-of-bounds memory read while computing the hash of the query for a packet cache lookup, possibly leading to a crash." } ] }, "impact": { "cvss": [ [ { "vectorString": "7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ] ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-125" } ] } ] }, "references": { "reference_data": [ { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16855", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16855" }, { "name": "https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2018-09.html", "refsource": "MISC", "url": "https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2018-09.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2018-16855", "datePublished": "2018-12-03T14:00:00", "dateReserved": "2018-09-11T00:00:00", "dateUpdated": "2024-08-05T10:32:54.074Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2008-1637
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T08:32:01.076Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "29764", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29764" }, { "name": "29737", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29737" }, { "name": "DSA-1544", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2008/dsa-1544" }, { "name": "FEDORA-2008-3010", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00198.html" }, { "name": "28517", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/28517" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://doc.powerdns.com/changelog.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.trusteer.com/docs/powerdnsrecursor.html" }, { "name": "29584", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29584" }, { "name": "SUSE-SR:2008:012", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00001.html" }, { "name": "ADV-2008-1046", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/1046/references" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.trusteer.com/docs/PowerDNS_recursor_DNS_Cache_Poisoning.pdf" }, { "name": "29830", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29830" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://doc.powerdns.com/powerdns-advisory-2008-01.html" }, { "name": "powerdns-dnscache-weak-security(41534)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41534" }, { "name": "GLSA-200804-22", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-200804-22.xml" }, { "name": "FEDORA-2008-3036", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00224.html" }, { "name": "20080331 Paper by Amit Klein (Trusteer): \"PowerDNS Recursor DNS Cache Poisoning [pharming]\"", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/490330/100/0/threaded" }, { "name": "30581", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/30581" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-03-31T00:00:00", "descriptions": [ { "lang": "en", "value": "PowerDNS Recursor before 3.1.5 uses insufficient randomness to calculate (1) TRXID values and (2) UDP source port numbers, which makes it easier for remote attackers to poison a DNS cache, related to (a) algorithmic deficiencies in rand and random functions in external libraries, (b) use of a 32-bit seed value, and (c) choice of the time of day as the sole seeding information." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-11T19:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "29764", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29764" }, { "name": "29737", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29737" }, { "name": "DSA-1544", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2008/dsa-1544" }, { "name": "FEDORA-2008-3010", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00198.html" }, { "name": "28517", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/28517" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://doc.powerdns.com/changelog.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.trusteer.com/docs/powerdnsrecursor.html" }, { "name": "29584", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29584" }, { "name": "SUSE-SR:2008:012", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00001.html" }, { "name": "ADV-2008-1046", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/1046/references" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.trusteer.com/docs/PowerDNS_recursor_DNS_Cache_Poisoning.pdf" }, { "name": "29830", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29830" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://doc.powerdns.com/powerdns-advisory-2008-01.html" }, { "name": "powerdns-dnscache-weak-security(41534)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41534" }, { "name": "GLSA-200804-22", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-200804-22.xml" }, { "name": "FEDORA-2008-3036", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00224.html" }, { "name": "20080331 Paper by Amit Klein (Trusteer): \"PowerDNS Recursor DNS Cache Poisoning [pharming]\"", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/490330/100/0/threaded" }, { "name": "30581", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/30581" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2008-1637", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "PowerDNS Recursor before 3.1.5 uses insufficient randomness to calculate (1) TRXID values and (2) UDP source port numbers, which makes it easier for remote attackers to poison a DNS cache, related to (a) algorithmic deficiencies in rand and random functions in external libraries, (b) use of a 32-bit seed value, and (c) choice of the time of day as the sole seeding information." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "29764", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29764" }, { "name": "29737", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29737" }, { "name": "DSA-1544", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2008/dsa-1544" }, { "name": "FEDORA-2008-3010", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00198.html" }, { "name": "28517", "refsource": "BID", "url": "http://www.securityfocus.com/bid/28517" }, { "name": "http://doc.powerdns.com/changelog.html", "refsource": "CONFIRM", "url": "http://doc.powerdns.com/changelog.html" }, { "name": "http://www.trusteer.com/docs/powerdnsrecursor.html", "refsource": "MISC", "url": "http://www.trusteer.com/docs/powerdnsrecursor.html" }, { "name": "29584", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29584" }, { "name": "SUSE-SR:2008:012", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00001.html" }, { "name": "ADV-2008-1046", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/1046/references" }, { "name": "http://www.trusteer.com/docs/PowerDNS_recursor_DNS_Cache_Poisoning.pdf", "refsource": "MISC", "url": "http://www.trusteer.com/docs/PowerDNS_recursor_DNS_Cache_Poisoning.pdf" }, { "name": "29830", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29830" }, { "name": "http://doc.powerdns.com/powerdns-advisory-2008-01.html", "refsource": "CONFIRM", "url": "http://doc.powerdns.com/powerdns-advisory-2008-01.html" }, { "name": "powerdns-dnscache-weak-security(41534)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41534" }, { "name": "GLSA-200804-22", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-200804-22.xml" }, { "name": "FEDORA-2008-3036", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00224.html" }, { "name": "20080331 Paper by Amit Klein (Trusteer): \"PowerDNS Recursor DNS Cache Poisoning [pharming]\"", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/490330/100/0/threaded" }, { "name": "30581", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/30581" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2008-1637", "datePublished": "2008-04-02T17:00:00", "dateReserved": "2008-04-02T00:00:00", "dateUpdated": "2024-08-07T08:32:01.076Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-15090
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://doc.powerdns.com/recursor/security-advisories/powerdns-advisory-2017-03.html | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/101982 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T19:50:14.915Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://doc.powerdns.com/recursor/security-advisories/powerdns-advisory-2017-03.html" }, { "name": "101982", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/101982" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "PowerDNS", "vendor": "PowerDNS", "versions": [ { "status": "affected", "version": "from 4.0.0 and up to and including 4.0.6" } ] } ], "datePublic": "2017-11-27T00:00:00", "descriptions": [ { "lang": "en", "value": "An issue has been found in the DNSSEC validation component of PowerDNS Recursor from 4.0.0 and up to and including 4.0.6, where the signatures might have been accepted as valid even if the signed data was not in bailiwick of the DNSKEY used to sign it. This allows an attacker in position of man-in-the-middle to alter the content of records by issuing a valid signature for the crafted records." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-347", "description": "CWE-347", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2018-01-24T10:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://doc.powerdns.com/recursor/security-advisories/powerdns-advisory-2017-03.html" }, { "name": "101982", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/101982" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "DATE_PUBLIC": "2017-11-27T00:00:00", "ID": "CVE-2017-15090", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "PowerDNS", "version": { "version_data": [ { "version_value": "from 4.0.0 and up to and including 4.0.6" } ] } } ] }, "vendor_name": "PowerDNS" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue has been found in the DNSSEC validation component of PowerDNS Recursor from 4.0.0 and up to and including 4.0.6, where the signatures might have been accepted as valid even if the signed data was not in bailiwick of the DNSKEY used to sign it. This allows an attacker in position of man-in-the-middle to alter the content of records by issuing a valid signature for the crafted records." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-347" } ] } ] }, "references": { "reference_data": [ { "name": "https://doc.powerdns.com/recursor/security-advisories/powerdns-advisory-2017-03.html", "refsource": "CONFIRM", "url": "https://doc.powerdns.com/recursor/security-advisories/powerdns-advisory-2017-03.html" }, { "name": "101982", "refsource": "BID", "url": "http://www.securityfocus.com/bid/101982" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2017-15090", "datePublished": "2018-01-23T15:00:00Z", "dateReserved": "2017-10-08T00:00:00", "dateUpdated": "2024-09-16T18:38:21.212Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-15120
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-15120 | x_refsource_CONFIRM | |
https://doc.powerdns.com/recursor/security-advisories/powerdns-advisory-2017-08.html | x_refsource_CONFIRM | |
https://www.debian.org/security/2017/dsa-4063 | vendor-advisory, x_refsource_DEBIAN | |
http://seclists.org/oss-sec/2017/q4/382 | mailing-list, x_refsource_MLIST | |
http://www.securityfocus.com/bid/106335 | vdb-entry, x_refsource_BID |
Vendor | Product | Version | |
---|---|---|---|
▼ | PowerDNS | pdns-recursor |
Version: 4.0.8 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T19:50:16.333Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-15120" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://doc.powerdns.com/recursor/security-advisories/powerdns-advisory-2017-08.html" }, { "name": "DSA-4063", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2017/dsa-4063" }, { "name": "[oss-security] 20171211 PowerDNS Security Advisory 2017-08", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://seclists.org/oss-sec/2017/q4/382" }, { "name": "106335", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/106335" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "pdns-recursor", "vendor": "PowerDNS", "versions": [ { "status": "affected", "version": "4.0.8" } ] } ], "datePublic": "2017-12-11T00:00:00", "descriptions": [ { "lang": "en", "value": "An issue has been found in the parsing of authoritative answers in PowerDNS Recursor before 4.0.8, leading to a NULL pointer dereference when parsing a specially crafted answer containing a CNAME of a different class than IN. An unauthenticated remote attacker could cause a denial of service." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-476", "description": "CWE-476", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2018-12-28T10:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-15120" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://doc.powerdns.com/recursor/security-advisories/powerdns-advisory-2017-08.html" }, { "name": "DSA-4063", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2017/dsa-4063" }, { "name": "[oss-security] 20171211 PowerDNS Security Advisory 2017-08", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://seclists.org/oss-sec/2017/q4/382" }, { "name": "106335", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/106335" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2017-15120", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "pdns-recursor", "version": { "version_data": [ { "version_value": "4.0.8" } ] } } ] }, "vendor_name": "PowerDNS" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue has been found in the parsing of authoritative answers in PowerDNS Recursor before 4.0.8, leading to a NULL pointer dereference when parsing a specially crafted answer containing a CNAME of a different class than IN. An unauthenticated remote attacker could cause a denial of service." } ] }, "impact": { "cvss": [ [ { "vectorString": "7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ] ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-476" } ] } ] }, "references": { "reference_data": [ { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-15120", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-15120" }, { "name": "https://doc.powerdns.com/recursor/security-advisories/powerdns-advisory-2017-08.html", "refsource": "CONFIRM", "url": "https://doc.powerdns.com/recursor/security-advisories/powerdns-advisory-2017-08.html" }, { "name": "DSA-4063", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2017/dsa-4063" }, { "name": "[oss-security] 20171211 PowerDNS Security Advisory 2017-08", "refsource": "MLIST", "url": "http://seclists.org/oss-sec/2017/q4/382" }, { "name": "106335", "refsource": "BID", "url": "http://www.securityfocus.com/bid/106335" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2017-15120", "datePublished": "2018-07-27T15:00:00", "dateReserved": "2017-10-08T00:00:00", "dateUpdated": "2024-08-05T19:50:16.333Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-1000003
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://doc.powerdns.com/recursor/security-advisories/powerdns-advisory-2018-01.html | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T12:33:48.549Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://doc.powerdns.com/recursor/security-advisories/powerdns-advisory-2018-01.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "dateAssigned": "2018-01-15T00:00:00", "datePublic": "2018-01-22T00:00:00", "descriptions": [ { "lang": "en", "value": "Improper input validation bugs in DNSSEC validators components in PowerDNS version 4.1.0 allow attacker in man-in-the-middle position to deny existence of some data in DNS via packet replay." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-01-22T17:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://doc.powerdns.com/recursor/security-advisories/powerdns-advisory-2018-01.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "DATE_ASSIGNED": "2018-01-15", "ID": "CVE-2018-1000003", "REQUESTER": "petr.spacek@nic.cz", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Improper input validation bugs in DNSSEC validators components in PowerDNS version 4.1.0 allow attacker in man-in-the-middle position to deny existence of some data in DNS via packet replay." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://doc.powerdns.com/recursor/security-advisories/powerdns-advisory-2018-01.html", "refsource": "CONFIRM", "url": "https://doc.powerdns.com/recursor/security-advisories/powerdns-advisory-2018-01.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2018-1000003", "datePublished": "2018-01-22T18:00:00", "dateReserved": "2018-01-16T00:00:00", "dateUpdated": "2024-08-05T12:33:48.549Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-22617
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T10:13:49.520Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://docs.powerdns.com/recursor/security-advisories/" }, { "name": "[oss-security] 20230120 Security Advisory 2023-01 for PowerDNS Recursor 4.8.0 (CVE-2023-22617)", "tags": [ "mailing-list", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2023/01/20/1" }, { "tags": [ "x_transferred" ], "url": "https://docs.powerdns.com/recursor/changelog/4.8.html#change-4.8.1" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "A remote attacker might be able to cause infinite recursion in PowerDNS Recursor 4.8.0 via a DNS query that retrieves DS records for a misconfigured domain, because QName minimization is used in QM fallback mode. This is fixed in 4.8.1." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-01-21T00:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://docs.powerdns.com/recursor/security-advisories/" }, { "name": "[oss-security] 20230120 Security Advisory 2023-01 for PowerDNS Recursor 4.8.0 (CVE-2023-22617)", "tags": [ "mailing-list" ], "url": "http://www.openwall.com/lists/oss-security/2023/01/20/1" }, { "url": "https://docs.powerdns.com/recursor/changelog/4.8.html#change-4.8.1" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2023-22617", "datePublished": "2023-01-21T00:00:00", "dateReserved": "2023-01-04T00:00:00", "dateUpdated": "2024-08-02T10:13:49.520Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2009-4009
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://www.redhat.com/archives/fedora-package-announce/2010-January/msg00217.html | vendor-advisory, x_refsource_FEDORA | |
http://securitytracker.com/id?1023403 | vdb-entry, x_refsource_SECTRACK | |
http://www.securityfocus.com/archive/1/508743/100/0/threaded | mailing-list, x_refsource_BUGTRAQ | |
http://doc.powerdns.com/powerdns-advisory-2010-01.html | x_refsource_CONFIRM | |
https://bugzilla.redhat.com/show_bug.cgi?id=552285 | x_refsource_CONFIRM | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/55438 | vdb-entry, x_refsource_XF | |
http://secunia.com/advisories/38004 | third-party-advisory, x_refsource_SECUNIA | |
https://www.redhat.com/archives/fedora-package-announce/2010-January/msg00228.html | vendor-advisory, x_refsource_FEDORA | |
http://www.securityfocus.com/bid/37650 | vdb-entry, x_refsource_BID | |
http://secunia.com/advisories/38068 | third-party-advisory, x_refsource_SECUNIA | |
http://www.vupen.com/english/advisories/2010/0054 | vdb-entry, x_refsource_VUPEN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T06:45:50.893Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "FEDORA-2010-0209", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2010-January/msg00217.html" }, { "name": "1023403", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1023403" }, { "name": "20100106 Critical PowerDNS Recursor Security Vulnerabilities: please upgrade ASAP to 3.1.7.2", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/508743/100/0/threaded" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://doc.powerdns.com/powerdns-advisory-2010-01.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=552285" }, { "name": "powerdns-unspecified-bo(55438)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/55438" }, { "name": "38004", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/38004" }, { "name": "FEDORA-2010-0228", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2010-January/msg00228.html" }, { "name": "37650", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/37650" }, { "name": "38068", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/38068" }, { "name": "ADV-2010-0054", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/0054" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-01-06T00:00:00", "descriptions": [ { "lang": "en", "value": "Buffer overflow in PowerDNS Recursor before 3.1.7.2 allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via crafted packets." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-10T18:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "FEDORA-2010-0209", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2010-January/msg00217.html" }, { "name": "1023403", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1023403" }, { "name": "20100106 Critical PowerDNS Recursor Security Vulnerabilities: please upgrade ASAP to 3.1.7.2", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/508743/100/0/threaded" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://doc.powerdns.com/powerdns-advisory-2010-01.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=552285" }, { "name": "powerdns-unspecified-bo(55438)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/55438" }, { "name": "38004", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/38004" }, { "name": "FEDORA-2010-0228", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2010-January/msg00228.html" }, { "name": "37650", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/37650" }, { "name": "38068", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/38068" }, { "name": "ADV-2010-0054", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/0054" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2009-4009", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Buffer overflow in PowerDNS Recursor before 3.1.7.2 allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via crafted packets." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "FEDORA-2010-0209", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2010-January/msg00217.html" }, { "name": "1023403", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1023403" }, { "name": "20100106 Critical PowerDNS Recursor Security Vulnerabilities: please upgrade ASAP to 3.1.7.2", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/508743/100/0/threaded" }, { "name": "http://doc.powerdns.com/powerdns-advisory-2010-01.html", "refsource": "CONFIRM", "url": "http://doc.powerdns.com/powerdns-advisory-2010-01.html" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=552285", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=552285" }, { "name": "powerdns-unspecified-bo(55438)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/55438" }, { "name": "38004", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/38004" }, { "name": "FEDORA-2010-0228", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2010-January/msg00228.html" }, { "name": "37650", "refsource": "BID", "url": "http://www.securityfocus.com/bid/37650" }, { "name": "38068", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/38068" }, { "name": "ADV-2010-0054", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2010/0054" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2009-4009", "datePublished": "2010-01-08T17:00:00", "dateReserved": "2009-11-19T00:00:00", "dateUpdated": "2024-08-07T06:45:50.893Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2016-7073
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-7073 | x_refsource_CONFIRM | |
https://www.debian.org/security/2017/dsa-3764 | vendor-advisory, x_refsource_DEBIAN | |
https://doc.powerdns.com/md/security/powerdns-advisory-2016-04/ | x_refsource_CONFIRM |
Vendor | Product | Version | |
---|---|---|---|
▼ | Open-Xchange | pdns |
Version: 3.4.11 Version: 4.0.2 Version: 4.0.4 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T01:50:47.448Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-7073" }, { "name": "DSA-3764", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2017/dsa-3764" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://doc.powerdns.com/md/security/powerdns-advisory-2016-04/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "pdns", "vendor": "Open-Xchange", "versions": [ { "status": "affected", "version": "3.4.11" }, { "status": "affected", "version": "4.0.2" }, { "status": "affected", "version": "4.0.4" } ] } ], "datePublic": "2016-12-15T00:00:00", "descriptions": [ { "lang": "en", "value": "An issue has been found in PowerDNS before 3.4.11 and 4.0.2, and PowerDNS recursor before 4.0.4, allowing an attacker in position of man-in-the-middle to alter the content of an AXFR because of insufficient validation of TSIG signatures. A missing check of the TSIG time and fudge values was found in AXFRRetriever, leading to a possible replay attack." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2018-09-12T09:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-7073" }, { "name": "DSA-3764", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2017/dsa-3764" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://doc.powerdns.com/md/security/powerdns-advisory-2016-04/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2016-7073", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "pdns", "version": { "version_data": [ { "version_value": "3.4.11" }, { "version_value": "4.0.2" }, { "version_value": "4.0.4" } ] } } ] }, "vendor_name": "Open-Xchange" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue has been found in PowerDNS before 3.4.11 and 4.0.2, and PowerDNS recursor before 4.0.4, allowing an attacker in position of man-in-the-middle to alter the content of an AXFR because of insufficient validation of TSIG signatures. A missing check of the TSIG time and fudge values was found in AXFRRetriever, leading to a possible replay attack." } ] }, "impact": { "cvss": [ [ { "vectorString": "5.3/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" } ] ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-20" } ] } ] }, "references": { "reference_data": [ { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-7073", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-7073" }, { "name": "DSA-3764", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2017/dsa-3764" }, { "name": "https://doc.powerdns.com/md/security/powerdns-advisory-2016-04/", "refsource": "CONFIRM", "url": "https://doc.powerdns.com/md/security/powerdns-advisory-2016-04/" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2016-7073", "datePublished": "2018-09-11T13:00:00", "dateReserved": "2016-08-23T00:00:00", "dateUpdated": "2024-08-06T01:50:47.448Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-10851
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://doc.powerdns.com/recursor/security-advisories/powerdns-advisory-2018-04.html | x_refsource_CONFIRM | |
https://doc.powerdns.com/authoritative/security-advisories/powerdns-advisory-2018-03.html | x_refsource_CONFIRM | |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10851 | x_refsource_CONFIRM |
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | The PowerDNS Project | pdns |
Version: 3.3.0 to 4.1.4, excluding 4.1.5 and 4.0.6 |
||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T07:46:47.415Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://doc.powerdns.com/recursor/security-advisories/powerdns-advisory-2018-04.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://doc.powerdns.com/authoritative/security-advisories/powerdns-advisory-2018-03.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10851" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "pdns", "vendor": "The PowerDNS Project", "versions": [ { "status": "affected", "version": "3.3.0 to 4.1.4, excluding 4.1.5 and 4.0.6" } ] }, { "product": "pdns-recursor", "vendor": "The PowerDNS Project", "versions": [ { "status": "affected", "version": "3.2 to 4.1.4, excluding 4.1.5 and 4.0.9" } ] } ], "datePublic": "2018-11-06T00:00:00", "descriptions": [ { "lang": "en", "value": "PowerDNS Authoritative Server 3.3.0 up to 4.1.4 excluding 4.1.5 and 4.0.6, and PowerDNS Recursor 3.2 up to 4.1.4 excluding 4.1.5 and 4.0.9, are vulnerable to a memory leak while parsing malformed records that can lead to remote denial of service." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-400", "description": "CWE-400", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2018-11-29T17:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://doc.powerdns.com/recursor/security-advisories/powerdns-advisory-2018-04.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://doc.powerdns.com/authoritative/security-advisories/powerdns-advisory-2018-03.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10851" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2018-10851", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "pdns", "version": { "version_data": [ { "version_value": "3.3.0 to 4.1.4, excluding 4.1.5 and 4.0.6" } ] } }, { "product_name": "pdns-recursor", "version": { "version_data": [ { "version_value": "3.2 to 4.1.4, excluding 4.1.5 and 4.0.9" } ] } } ] }, "vendor_name": "The PowerDNS Project" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "PowerDNS Authoritative Server 3.3.0 up to 4.1.4 excluding 4.1.5 and 4.0.6, and PowerDNS Recursor 3.2 up to 4.1.4 excluding 4.1.5 and 4.0.9, are vulnerable to a memory leak while parsing malformed records that can lead to remote denial of service." } ] }, "impact": { "cvss": [ [ { "vectorString": "5.3/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ] ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-400" } ] } ] }, "references": { "reference_data": [ { "name": "https://doc.powerdns.com/recursor/security-advisories/powerdns-advisory-2018-04.html", "refsource": "CONFIRM", "url": "https://doc.powerdns.com/recursor/security-advisories/powerdns-advisory-2018-04.html" }, { "name": "https://doc.powerdns.com/authoritative/security-advisories/powerdns-advisory-2018-03.html", "refsource": "CONFIRM", "url": "https://doc.powerdns.com/authoritative/security-advisories/powerdns-advisory-2018-03.html" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10851", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10851" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2018-10851", "datePublished": "2018-11-29T18:00:00", "dateReserved": "2018-05-09T00:00:00", "dateUpdated": "2024-08-05T07:46:47.415Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2014-8601
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://doc.powerdns.com/md/security/powerdns-advisory-2014-02/ | x_refsource_CONFIRM | |
http://www.debian.org/security/2014/dsa-3096 | vendor-advisory, x_refsource_DEBIAN | |
http://www.securitytracker.com/id/1031310 | vdb-entry, x_refsource_SECTRACK | |
http://cert.ssi.gouv.fr/site/CERTFR-2014-AVI-512/index.html | x_refsource_MISC | |
http://www.securityfocus.com/bid/71545 | vdb-entry, x_refsource_BID | |
http://www.kb.cert.org/vuls/id/264212 | third-party-advisory, x_refsource_CERT-VN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T13:26:02.389Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://doc.powerdns.com/md/security/powerdns-advisory-2014-02/" }, { "name": "DSA-3096", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2014/dsa-3096" }, { "name": "1031310", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1031310" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://cert.ssi.gouv.fr/site/CERTFR-2014-AVI-512/index.html" }, { "name": "71545", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/71545" }, { "name": "VU#264212", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/264212" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-12-08T00:00:00", "descriptions": [ { "lang": "en", "value": "PowerDNS Recursor before 3.6.2 does not limit delegation chaining, which allows remote attackers to cause a denial of service (\"performance degradations\") via a large or infinite number of referrals, as demonstrated by resolving domains hosted by ezdns.it." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2015-02-24T16:57:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://doc.powerdns.com/md/security/powerdns-advisory-2014-02/" }, { "name": "DSA-3096", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2014/dsa-3096" }, { "name": "1031310", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1031310" }, { "tags": [ "x_refsource_MISC" ], "url": "http://cert.ssi.gouv.fr/site/CERTFR-2014-AVI-512/index.html" }, { "name": "71545", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/71545" }, { "name": "VU#264212", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/264212" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2014-8601", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "PowerDNS Recursor before 3.6.2 does not limit delegation chaining, which allows remote attackers to cause a denial of service (\"performance degradations\") via a large or infinite number of referrals, as demonstrated by resolving domains hosted by ezdns.it." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://doc.powerdns.com/md/security/powerdns-advisory-2014-02/", "refsource": "CONFIRM", "url": "http://doc.powerdns.com/md/security/powerdns-advisory-2014-02/" }, { "name": "DSA-3096", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2014/dsa-3096" }, { "name": "1031310", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1031310" }, { "name": "http://cert.ssi.gouv.fr/site/CERTFR-2014-AVI-512/index.html", "refsource": "MISC", "url": "http://cert.ssi.gouv.fr/site/CERTFR-2014-AVI-512/index.html" }, { "name": "71545", "refsource": "BID", "url": "http://www.securityfocus.com/bid/71545" }, { "name": "VU#264212", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/264212" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2014-8601", "datePublished": "2014-12-10T15:00:00", "dateReserved": "2014-11-04T00:00:00", "dateUpdated": "2024-08-06T13:26:02.389Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-10030
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://doc.powerdns.com/recursor/security-advisories/powerdns-advisory-2020-03.html | x_refsource_CONFIRM | |
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00052.html | vendor-advisory, x_refsource_SUSE | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PS4ZN5XGENYNFKX7QIIOUCQQHXE37GJF/ | vendor-advisory, x_refsource_FEDORA | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NMP72NJGKBWR5WEBXAWX5KSLQUDFTG6S/ | vendor-advisory, x_refsource_FEDORA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T10:50:57.821Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://doc.powerdns.com/recursor/security-advisories/powerdns-advisory-2020-03.html" }, { "name": "openSUSE-SU-2020:0698", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00052.html" }, { "name": "FEDORA-2020-d9abb0c06d", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PS4ZN5XGENYNFKX7QIIOUCQQHXE37GJF/" }, { "name": "FEDORA-2020-c0ff3df740", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NMP72NJGKBWR5WEBXAWX5KSLQUDFTG6S/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2020-05-19T00:00:00", "descriptions": [ { "lang": "en", "value": "An issue has been found in PowerDNS Recursor 4.1.0 up to and including 4.3.0. It allows an attacker (with enough privileges to change the system\u0027s hostname) to cause disclosure of uninitialized memory content via a stack-based out-of-bounds read. It only occurs on systems where gethostname() does not have \u0027\\0\u0027 termination of the returned string if the hostname is larger than the supplied buffer. (Linux systems are not affected because the buffer is always large enough. OpenBSD systems are not affected because the returned hostname always has \u0027\\0\u0027 termination.) Under some conditions, this issue can lead to the writing of one \u0027\\0\u0027 byte out-of-bounds on the stack, causing a denial of service or possibly arbitrary code execution." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-06-14T18:06:09", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://doc.powerdns.com/recursor/security-advisories/powerdns-advisory-2020-03.html" }, { "name": "openSUSE-SU-2020:0698", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00052.html" }, { "name": "FEDORA-2020-d9abb0c06d", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PS4ZN5XGENYNFKX7QIIOUCQQHXE37GJF/" }, { "name": "FEDORA-2020-c0ff3df740", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NMP72NJGKBWR5WEBXAWX5KSLQUDFTG6S/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-10030", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue has been found in PowerDNS Recursor 4.1.0 up to and including 4.3.0. It allows an attacker (with enough privileges to change the system\u0027s hostname) to cause disclosure of uninitialized memory content via a stack-based out-of-bounds read. It only occurs on systems where gethostname() does not have \u0027\\0\u0027 termination of the returned string if the hostname is larger than the supplied buffer. (Linux systems are not affected because the buffer is always large enough. OpenBSD systems are not affected because the returned hostname always has \u0027\\0\u0027 termination.) Under some conditions, this issue can lead to the writing of one \u0027\\0\u0027 byte out-of-bounds on the stack, causing a denial of service or possibly arbitrary code execution." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://doc.powerdns.com/recursor/security-advisories/powerdns-advisory-2020-03.html", "refsource": "CONFIRM", "url": "https://doc.powerdns.com/recursor/security-advisories/powerdns-advisory-2020-03.html" }, { "name": "openSUSE-SU-2020:0698", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00052.html" }, { "name": "FEDORA-2020-d9abb0c06d", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PS4ZN5XGENYNFKX7QIIOUCQQHXE37GJF/" }, { "name": "FEDORA-2020-c0ff3df740", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NMP72NJGKBWR5WEBXAWX5KSLQUDFTG6S/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-10030", "datePublished": "2020-05-19T15:52:20", "dateReserved": "2020-03-04T00:00:00", "dateUpdated": "2024-08-04T10:50:57.821Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-10995
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.nxnsattack.com | x_refsource_MISC | |
https://doc.powerdns.com/recursor/security-advisories/powerdns-advisory-2020-01.html | x_refsource_CONFIRM | |
https://www.debian.org/security/2020/dsa-4691 | vendor-advisory, x_refsource_DEBIAN | |
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00052.html | vendor-advisory, x_refsource_SUSE | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PS4ZN5XGENYNFKX7QIIOUCQQHXE37GJF/ | vendor-advisory, x_refsource_FEDORA | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NMP72NJGKBWR5WEBXAWX5KSLQUDFTG6S/ | vendor-advisory, x_refsource_FEDORA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T11:21:14.519Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.nxnsattack.com" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://doc.powerdns.com/recursor/security-advisories/powerdns-advisory-2020-01.html" }, { "name": "DSA-4691", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2020/dsa-4691" }, { "name": "openSUSE-SU-2020:0698", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00052.html" }, { "name": "FEDORA-2020-d9abb0c06d", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PS4ZN5XGENYNFKX7QIIOUCQQHXE37GJF/" }, { "name": "FEDORA-2020-c0ff3df740", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NMP72NJGKBWR5WEBXAWX5KSLQUDFTG6S/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2020-05-19T00:00:00", "descriptions": [ { "lang": "en", "value": "PowerDNS Recursor from 4.1.0 up to and including 4.3.0 does not sufficiently defend against amplification attacks. An issue in the DNS protocol has been found that allow malicious parties to use recursive DNS services to attack third party authoritative name servers. The attack uses a crafted reply by an authoritative name server to amplify the resulting traffic between the recursive and other authoritative name servers. Both types of service can suffer degraded performance as an effect. This is triggered by random subdomains in the NSDNAME in NS records. PowerDNS Recursor 4.1.16, 4.2.2 and 4.3.1 contain a mitigation to limit the impact of this DNS protocol issue." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-06-14T18:06:10", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://www.nxnsattack.com" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://doc.powerdns.com/recursor/security-advisories/powerdns-advisory-2020-01.html" }, { "name": "DSA-4691", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2020/dsa-4691" }, { "name": "openSUSE-SU-2020:0698", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00052.html" }, { "name": "FEDORA-2020-d9abb0c06d", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PS4ZN5XGENYNFKX7QIIOUCQQHXE37GJF/" }, { "name": "FEDORA-2020-c0ff3df740", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NMP72NJGKBWR5WEBXAWX5KSLQUDFTG6S/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-10995", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "PowerDNS Recursor from 4.1.0 up to and including 4.3.0 does not sufficiently defend against amplification attacks. An issue in the DNS protocol has been found that allow malicious parties to use recursive DNS services to attack third party authoritative name servers. The attack uses a crafted reply by an authoritative name server to amplify the resulting traffic between the recursive and other authoritative name servers. Both types of service can suffer degraded performance as an effect. This is triggered by random subdomains in the NSDNAME in NS records. PowerDNS Recursor 4.1.16, 4.2.2 and 4.3.1 contain a mitigation to limit the impact of this DNS protocol issue." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.nxnsattack.com", "refsource": "MISC", "url": "http://www.nxnsattack.com" }, { "name": "https://doc.powerdns.com/recursor/security-advisories/powerdns-advisory-2020-01.html", "refsource": "CONFIRM", "url": "https://doc.powerdns.com/recursor/security-advisories/powerdns-advisory-2020-01.html" }, { "name": "DSA-4691", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2020/dsa-4691" }, { "name": "openSUSE-SU-2020:0698", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00052.html" }, { "name": "FEDORA-2020-d9abb0c06d", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PS4ZN5XGENYNFKX7QIIOUCQQHXE37GJF/" }, { "name": "FEDORA-2020-c0ff3df740", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NMP72NJGKBWR5WEBXAWX5KSLQUDFTG6S/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-10995", "datePublished": "2020-05-19T16:04:12", "dateReserved": "2020-03-27T00:00:00", "dateUpdated": "2024-08-04T11:21:14.519Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-25583
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:powerdns:powerdns:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "powerdns", "vendor": "powerdns", "versions": [ { "status": "affected", "version": "4.8.7" } ] }, { "cpes": [ "cpe:2.3:a:powerdns:powerdns:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "powerdns", "vendor": "powerdns", "versions": [ { "status": "affected", "version": "4.9.4" } ] }, { "cpes": [ "cpe:2.3:a:powerdns:powerdns:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "powerdns", "vendor": "powerdns", "versions": [ { "status": "affected", "version": "5.0.3" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-25583", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-04-29T19:14:51.254409Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:35:23.421Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T23:44:09.678Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://doc.powerdns.com/recursor/security-advisories/powerdns-advisory-2024-02.html" }, { "tags": [ "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2024/04/24/1" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "collectionURL": "https://repo.powerdns.com/", "defaultStatus": "unaffected", "modules": [ "resolver" ], "packageName": "pdns-recursor", "product": "Recursor", "repo": "https://github.com/PowerDNS/pdns", "vendor": "PowerDNS", "versions": [ { "status": "affected", "version": "4.8.7" }, { "status": "affected", "version": "4.9.4" }, { "status": "affected", "version": "5.0.3" } ] } ], "datePublic": "2024-04-24T09:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eA crafted response from an upstream server the recursor has been configured to forward-recurse to can cause a Denial of Service in the Recursor. The default configuration of the Recursor does not use recursive forwarding and is not affected.\u003c/p\u003e" } ], "value": "A crafted response from an upstream server the recursor has been configured to forward-recurse to can cause a Denial of Service in the Recursor. The default configuration of the Recursor does not use recursive forwarding and is not affected.\n\n" } ], "impacts": [ { "capecId": "CAPEC-25", "descriptions": [ { "lang": "en", "value": "CAPEC-25 Forced Deadlock" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-25T09:45:05.220Z", "orgId": "8ce71d90-2354-404b-a86e-bec2cc4e6981", "shortName": "OX" }, "references": [ { "url": "https://doc.powerdns.com/recursor/security-advisories/powerdns-advisory-2024-02.html" }, { "url": "http://www.openwall.com/lists/oss-security/2024/04/24/1" } ], "source": { "discovery": "INTERNAL" }, "title": "Crafted responses can lead to a denial of service in Recursor if recursive forwarding is configured" } }, "cveMetadata": { "assignerOrgId": "8ce71d90-2354-404b-a86e-bec2cc4e6981", "assignerShortName": "OX", "cveId": "CVE-2024-25583", "datePublished": "2024-04-25T09:45:05.220Z", "dateReserved": "2024-02-08T08:15:37.204Z", "dateUpdated": "2024-08-01T23:44:09.678Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-3807
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2019-02.html | x_refsource_CONFIRM | |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3807 | x_refsource_CONFIRM |
Vendor | Product | Version | |
---|---|---|---|
▼ | Power DNS | pdns-recursor |
Version: versions 4.1.x before 4.1.9 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T19:19:18.394Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2019-02.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3807" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "pdns-recursor", "vendor": "Power DNS", "versions": [ { "status": "affected", "version": "versions 4.1.x before 4.1.9" } ] } ], "datePublic": "2019-01-21T00:00:00", "descriptions": [ { "lang": "en", "value": "An issue has been found in PowerDNS Recursor versions 4.1.x before 4.1.9 where records in the answer section of responses received from authoritative servers with the AA flag not set were not properly validated, allowing an attacker to bypass DNSSEC validation." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-345", "description": "CWE-345", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2019-01-29T16:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2019-02.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3807" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2019-3807", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "pdns-recursor", "version": { "version_data": [ { "version_value": "versions 4.1.x before 4.1.9" } ] } } ] }, "vendor_name": "Power DNS" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue has been found in PowerDNS Recursor versions 4.1.x before 4.1.9 where records in the answer section of responses received from authoritative servers with the AA flag not set were not properly validated, allowing an attacker to bypass DNSSEC validation." } ] }, "impact": { "cvss": [ [ { "vectorString": "3.7/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N", "version": "3.0" } ] ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-345" } ] } ] }, "references": { "reference_data": [ { "name": "https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2019-02.html", "refsource": "CONFIRM", "url": "https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2019-02.html" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3807", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3807" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2019-3807", "datePublished": "2019-01-29T17:00:00", "dateReserved": "2019-01-03T00:00:00", "dateUpdated": "2024-08-04T19:19:18.394Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-5470
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://doc.powerdns.com/md/security/powerdns-advisory-2015-01/ | x_refsource_CONFIRM | |
http://www.openwall.com/lists/oss-security/2015/07/10/8 | mailing-list, x_refsource_MLIST | |
http://www.openwall.com/lists/oss-security/2015/07/07/6 | mailing-list, x_refsource_MLIST |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T06:50:02.364Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://doc.powerdns.com/md/security/powerdns-advisory-2015-01/" }, { "name": "[oss-security] 20150710 Re: Follow up: PowerDNS Security Advisory 2015-01", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2015/07/10/8" }, { "name": "[oss-security] 20150707 Follow up: PowerDNS Security Advisory 2015-01", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2015/07/07/6" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-07-07T00:00:00", "descriptions": [ { "lang": "en", "value": "The label decompression functionality in PowerDNS Recursor before 3.6.4 and 3.7.x before 3.7.3 and Authoritative (Auth) Server before 3.3.3 and 3.4.x before 3.4.5 allows remote attackers to cause a denial of service (CPU consumption or crash) via a request with a long name that refers to itself. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-1868." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2015-11-02T18:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://doc.powerdns.com/md/security/powerdns-advisory-2015-01/" }, { "name": "[oss-security] 20150710 Re: Follow up: PowerDNS Security Advisory 2015-01", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2015/07/10/8" }, { "name": "[oss-security] 20150707 Follow up: PowerDNS Security Advisory 2015-01", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2015/07/07/6" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2015-5470", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The label decompression functionality in PowerDNS Recursor before 3.6.4 and 3.7.x before 3.7.3 and Authoritative (Auth) Server before 3.3.3 and 3.4.x before 3.4.5 allows remote attackers to cause a denial of service (CPU consumption or crash) via a request with a long name that refers to itself. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-1868." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://doc.powerdns.com/md/security/powerdns-advisory-2015-01/", "refsource": "CONFIRM", "url": "https://doc.powerdns.com/md/security/powerdns-advisory-2015-01/" }, { "name": "[oss-security] 20150710 Re: Follow up: PowerDNS Security Advisory 2015-01", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2015/07/10/8" }, { "name": "[oss-security] 20150707 Follow up: PowerDNS Security Advisory 2015-01", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2015/07/07/6" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2015-5470", "datePublished": "2015-11-02T19:00:00", "dateReserved": "2015-07-10T00:00:00", "dateUpdated": "2024-08-06T06:50:02.364Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-25590
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-25590", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-03T17:34:21.950059Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-03T17:34:32.913Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-10-03T18:03:26.815Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "url": "http://www.openwall.com/lists/oss-security/2024/10/03/3" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "collectionURL": "https://repo.powerdns.com/", "defaultStatus": "unaffected", "modules": [ "resolver" ], "packageName": "pdns-recursor", "product": "Recursor", "programFiles": [ "recursor_cache.cc" ], "repo": "https://github.com/PowerDNS/pdns", "vendor": "PowerDNS", "versions": [ { "lessThan": "4.9.9", "status": "affected", "version": "0", "versionType": "semver" }, { "lessThan": "5.0.9", "status": "affected", "version": "5.0.0", "versionType": "semver" }, { "lessThan": "5.1.2", "status": "affected", "version": "5.1.0", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Toshifumi Sakaguchi" } ], "datePublic": "2024-10-03T10:51:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eAn attacker can publish a zone containing specific Resource Record Sets.\u003c/p\u003e\u003cp\u003e Repeatedly processing and caching results for these sets can lead to a \u003c/p\u003e\u003cp\u003edenial of service.\u003c/p\u003e" } ], "value": "An attacker can publish a zone containing specific Resource Record Sets.\n\n Repeatedly processing and caching results for these sets can lead to a \n\ndenial of service." } ], "impacts": [ { "capecId": "CAPEC-130", "descriptions": [ { "lang": "en", "value": "CAPEC-130 Excessive Allocation" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-03T15:29:08.765Z", "orgId": "8ce71d90-2354-404b-a86e-bec2cc4e6981", "shortName": "OX" }, "references": [ { "url": "https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2024-04.html" } ], "source": { "advisory": "PowerDNS Security Advisory 2024-04", "discovery": "EXTERNAL" }, "title": "Crafted responses can lead to a denial of service due to cache inefficiencies in the Recursor", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "8ce71d90-2354-404b-a86e-bec2cc4e6981", "assignerShortName": "OX", "cveId": "CVE-2024-25590", "datePublished": "2024-10-03T15:29:08.765Z", "dateReserved": "2024-02-08T08:15:37.205Z", "dateUpdated": "2024-10-03T18:03:26.815Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2008-3217
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.openwall.com/lists/oss-security/2008/07/16/12 | mailing-list, x_refsource_MLIST | |
http://wiki.powerdns.com/cgi-bin/trac.fcgi/changeset/1179 | x_refsource_CONFIRM | |
http://secunia.com/advisories/31311 | third-party-advisory, x_refsource_SECUNIA | |
http://www.openwall.com/lists/oss-security/2008/07/09/10 | mailing-list, x_refsource_MLIST | |
http://www.openwall.com/lists/oss-security/2008/07/10/6 | mailing-list, x_refsource_MLIST | |
http://doc.powerdns.com/changelog.html#CHANGELOG-RECURSOR-3-1-6 | x_refsource_CONFIRM | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/43925 | vdb-entry, x_refsource_XF | |
https://www.redhat.com/archives/fedora-package-announce/2008-July/msg01353.html | vendor-advisory, x_refsource_FEDORA | |
http://www.securityfocus.com/bid/30782 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T09:28:41.717Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[oss-security] 20080716 Re: CVE request: PowerDNS recursor source port randomization", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2008/07/16/12" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://wiki.powerdns.com/cgi-bin/trac.fcgi/changeset/1179" }, { "name": "31311", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/31311" }, { "name": "[oss-security] 20080709 CVE request: PowerDNS recursor source port randomization", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2008/07/09/10" }, { "name": "[oss-security] 20080710 Re: DNS vulnerability: other relevant software", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2008/07/10/6" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://doc.powerdns.com/changelog.html#CHANGELOG-RECURSOR-3-1-6" }, { "name": "powerdns-recursor-rng-weak-security(43925)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43925" }, { "name": "FEDORA-2008-6893", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg01353.html" }, { "name": "30782", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/30782" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-07-09T00:00:00", "descriptions": [ { "lang": "en", "value": "PowerDNS Recursor before 3.1.6 does not always use the strongest random number generator for source port selection, which makes it easier for remote attack vectors to conduct DNS cache poisoning. NOTE: this is related to incomplete integration of security improvements associated with addressing CVE-2008-1637." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-07T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "[oss-security] 20080716 Re: CVE request: PowerDNS recursor source port randomization", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2008/07/16/12" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://wiki.powerdns.com/cgi-bin/trac.fcgi/changeset/1179" }, { "name": "31311", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/31311" }, { "name": "[oss-security] 20080709 CVE request: PowerDNS recursor source port randomization", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2008/07/09/10" }, { "name": "[oss-security] 20080710 Re: DNS vulnerability: other relevant software", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2008/07/10/6" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://doc.powerdns.com/changelog.html#CHANGELOG-RECURSOR-3-1-6" }, { "name": "powerdns-recursor-rng-weak-security(43925)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43925" }, { "name": "FEDORA-2008-6893", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg01353.html" }, { "name": "30782", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/30782" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2008-3217", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "PowerDNS Recursor before 3.1.6 does not always use the strongest random number generator for source port selection, which makes it easier for remote attack vectors to conduct DNS cache poisoning. NOTE: this is related to incomplete integration of security improvements associated with addressing CVE-2008-1637." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "[oss-security] 20080716 Re: CVE request: PowerDNS recursor source port randomization", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2008/07/16/12" }, { "name": "http://wiki.powerdns.com/cgi-bin/trac.fcgi/changeset/1179", "refsource": "CONFIRM", "url": "http://wiki.powerdns.com/cgi-bin/trac.fcgi/changeset/1179" }, { "name": "31311", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/31311" }, { "name": "[oss-security] 20080709 CVE request: PowerDNS recursor source port randomization", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2008/07/09/10" }, { "name": "[oss-security] 20080710 Re: DNS vulnerability: other relevant software", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2008/07/10/6" }, { "name": "http://doc.powerdns.com/changelog.html#CHANGELOG-RECURSOR-3-1-6", "refsource": "CONFIRM", "url": "http://doc.powerdns.com/changelog.html#CHANGELOG-RECURSOR-3-1-6" }, { "name": "powerdns-recursor-rng-weak-security(43925)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43925" }, { "name": "FEDORA-2008-6893", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg01353.html" }, { "name": "30782", "refsource": "BID", "url": "http://www.securityfocus.com/bid/30782" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2008-3217", "datePublished": "2008-07-18T16:00:00", "dateReserved": "2008-07-18T00:00:00", "dateUpdated": "2024-08-07T09:28:41.717Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-26437
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T11:46:24.652Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2023-02.html" }, { "tags": [ "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CN7VMRYKZHG2UDUAK326LXD3JY7NO3LR/" }, { "tags": [ "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IHPD6SIQOG7245GXFQHPUEI4AZ6Y3KD6/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "affected", "product": "Recursor", "vendor": "PowerDNS", "versions": [ { "lessThanOrEqual": "4.6.5", "status": "affected", "version": "0", "versionType": "range" }, { "lessThanOrEqual": "4.7.4 ", "status": "affected", "version": "0", "versionType": "range" }, { "lessThanOrEqual": "4.8.3", "status": "affected", "version": "0", "versionType": "range" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Denial of service vulnerability in PowerDNS Recursor allows authoritative servers to be marked unavailable.\u003cp\u003eThis issue affects Recursor: through 4.6.5, through 4.7.4 , through 4.8.3.\u003c/p\u003e" } ], "value": "Denial of service vulnerability in PowerDNS Recursor allows authoritative servers to be marked unavailable.This issue affects Recursor: through 4.6.5, through 4.7.4 , through 4.8.3.\n\n" } ], "impacts": [ { "descriptions": [ { "lang": "en", "value": "authoritative servers to be marked unavailable" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 3.4, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "description": "Denial of service", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-04-04T14:59:24.624Z", "orgId": "8ce71d90-2354-404b-a86e-bec2cc4e6981", "shortName": "OX" }, "references": [ { "url": "https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2023-02.html" }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CN7VMRYKZHG2UDUAK326LXD3JY7NO3LR/" }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IHPD6SIQOG7245GXFQHPUEI4AZ6Y3KD6/" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Upgrade to PowerDNS Recursor 4.6.6, 4.7.5 or 4.8.4. \u003cbr\u003e" } ], "value": "Upgrade to PowerDNS Recursor 4.6.6, 4.7.5 or 4.8.4. \n" } ], "source": { "discovery": "UNKNOWN" }, "title": "Deterred spoofing attempts can lead to authoritative servers being marked unavailable", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "8ce71d90-2354-404b-a86e-bec2cc4e6981", "assignerShortName": "OX", "cveId": "CVE-2023-26437", "datePublished": "2023-04-04T14:37:29.388Z", "dateReserved": "2023-02-22T20:42:56.090Z", "dateUpdated": "2024-08-02T11:46:24.652Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2006-4251
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.vupen.com/english/advisories/2006/4484 | vdb-entry, x_refsource_VUPEN | |
http://www.debian.org/security/2006/dsa-1211 | vendor-advisory, x_refsource_DEBIAN | |
http://secunia.com/advisories/22824 | third-party-advisory, x_refsource_SECUNIA | |
http://lists.suse.com/archive/suse-security-announce/2006-Nov/0007.html | vendor-advisory, x_refsource_SUSE | |
http://www.securityfocus.com/bid/21037 | vdb-entry, x_refsource_BID | |
http://secunia.com/advisories/22903 | third-party-advisory, x_refsource_SECUNIA | |
http://doc.powerdns.com/powerdns-advisory-2006-01.html | x_refsource_CONFIRM | |
http://secunia.com/advisories/22976 | third-party-advisory, x_refsource_SECUNIA | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/30270 | vdb-entry, x_refsource_XF |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T19:06:07.189Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "ADV-2006-4484", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2006/4484" }, { "name": "DSA-1211", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2006/dsa-1211" }, { "name": "22824", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/22824" }, { "name": "SUSE-SA:2006:070", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.suse.com/archive/suse-security-announce/2006-Nov/0007.html" }, { "name": "21037", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/21037" }, { "name": "22903", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/22903" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://doc.powerdns.com/powerdns-advisory-2006-01.html" }, { "name": "22976", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/22976" }, { "name": "powerdns-dns-bo(30270)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30270" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2006-11-13T00:00:00", "descriptions": [ { "lang": "en", "value": "Buffer overflow in PowerDNS Recursor 3.1.3 and earlier might allow remote attackers to execute arbitrary code via a malformed TCP DNS query that prevents Recursor from properly calculating the TCP DNS query length." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-19T15:57:01", "orgId": "79363d38-fa19-49d1-9214-5f28da3f3ac5", "shortName": "debian" }, "references": [ { "name": "ADV-2006-4484", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2006/4484" }, { "name": "DSA-1211", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2006/dsa-1211" }, { "name": "22824", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/22824" }, { "name": "SUSE-SA:2006:070", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.suse.com/archive/suse-security-announce/2006-Nov/0007.html" }, { "name": "21037", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/21037" }, { "name": "22903", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/22903" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://doc.powerdns.com/powerdns-advisory-2006-01.html" }, { "name": "22976", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/22976" }, { "name": "powerdns-dns-bo(30270)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30270" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@debian.org", "ID": "CVE-2006-4251", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Buffer overflow in PowerDNS Recursor 3.1.3 and earlier might allow remote attackers to execute arbitrary code via a malformed TCP DNS query that prevents Recursor from properly calculating the TCP DNS query length." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "ADV-2006-4484", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2006/4484" }, { "name": "DSA-1211", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2006/dsa-1211" }, { "name": "22824", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/22824" }, { "name": "SUSE-SA:2006:070", "refsource": "SUSE", "url": "http://lists.suse.com/archive/suse-security-announce/2006-Nov/0007.html" }, { "name": "21037", "refsource": "BID", "url": "http://www.securityfocus.com/bid/21037" }, { "name": "22903", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/22903" }, { "name": "http://doc.powerdns.com/powerdns-advisory-2006-01.html", "refsource": "CONFIRM", "url": "http://doc.powerdns.com/powerdns-advisory-2006-01.html" }, { "name": "22976", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/22976" }, { "name": "powerdns-dns-bo(30270)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30270" } ] } } } }, "cveMetadata": { "assignerOrgId": "79363d38-fa19-49d1-9214-5f28da3f3ac5", "assignerShortName": "debian", "cveId": "CVE-2006-4251", "datePublished": "2006-11-14T19:00:00", "dateReserved": "2006-08-21T00:00:00", "dateUpdated": "2024-08-07T19:06:07.189Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
debian | debian_linux | 7.0 | |
powerdns | recursor | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "16F59A04-14CF-49E2-9973-645477EA09DA", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:powerdns:recursor:*:*:*:*:*:*:*:*", "matchCriteriaId": "CEE78BD5-97DE-43F0-BF89-0A169A0498AC", "versionEndIncluding": "3.6.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "PowerDNS Recursor before 3.6.2 does not limit delegation chaining, which allows remote attackers to cause a denial of service (\"performance degradations\") via a large or infinite number of referrals, as demonstrated by resolving domains hosted by ezdns.it." }, { "lang": "es", "value": "PowerDNS Recursor en versiones anteriores a 3.6.2 no limita el encadenamiento de delegaci\u00f3n, lo que permite a atacantes remotos provocar una denegaci\u00f3n de servicio (\"degradaciones de rendimiento\") a trav\u00e9s un n\u00famero largo o infinito de referencias, seg\u00fan lo demostrado por la resoluci\u00f3n de dominios alojados por ezdns.it." } ], "id": "CVE-2014-8601", "lastModified": "2024-11-21T02:19:25.237", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-12-10T15:59:17.410", "references": [ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://cert.ssi.gouv.fr/site/CERTFR-2014-AVI-512/index.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://doc.powerdns.com/md/security/powerdns-advisory-2014-02/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2014/dsa-3096" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/264212" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/71545" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1031310" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://cert.ssi.gouv.fr/site/CERTFR-2014-AVI-512/index.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://doc.powerdns.com/md/security/powerdns-advisory-2014-02/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2014/dsa-3096" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/264212" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/71545" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1031310" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-399" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
powerdns | recursor | * | |
powerdns | recursor | 2.0_rc1 | |
powerdns | recursor | 2.8 | |
powerdns | recursor | 2.9.15 | |
powerdns | recursor | 2.9.16 | |
powerdns | recursor | 2.9.17 | |
powerdns | recursor | 2.9.18 | |
powerdns | recursor | 3.0 | |
powerdns | recursor | 3.0.1 | |
powerdns | recursor | 3.1 | |
powerdns | recursor | 3.1.1 | |
powerdns | recursor | 3.1.2 | |
powerdns | recursor | 3.1.3 | |
powerdns | recursor | 3.1.4 | |
powerdns | recursor | 3.1.5 | |
powerdns | recursor | 3.1.6 | |
powerdns | recursor | 3.1.7 | |
powerdns | recursor | 3.1.7.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:powerdns:recursor:*:*:*:*:*:*:*:*", "matchCriteriaId": "E8F4B452-AA57-4D2A-B757-7B4F7C712CB6", "versionEndIncluding": "3.1.7.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:powerdns:recursor:2.0_rc1:*:*:*:*:*:*:*", "matchCriteriaId": "E02559EA-6C7F-4328-A435-B4F69E640645", "vulnerable": true }, { "criteria": "cpe:2.3:a:powerdns:recursor:2.8:*:*:*:*:*:*:*", "matchCriteriaId": "D390616D-8CAB-46D3-864D-09AF99E3A407", "vulnerable": true }, { "criteria": "cpe:2.3:a:powerdns:recursor:2.9.15:*:*:*:*:*:*:*", "matchCriteriaId": "47DFAA6A-CA5B-4B2A-BFC2-A0DF85BF68D8", "vulnerable": true }, { "criteria": "cpe:2.3:a:powerdns:recursor:2.9.16:*:*:*:*:*:*:*", "matchCriteriaId": "306EBF4B-2292-4B14-9835-9FD0E82FE7CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:powerdns:recursor:2.9.17:*:*:*:*:*:*:*", "matchCriteriaId": "3A31C83E-8A81-4483-A245-FD1C08684183", "vulnerable": true }, { "criteria": "cpe:2.3:a:powerdns:recursor:2.9.18:*:*:*:*:*:*:*", "matchCriteriaId": "44D51FCC-8AD6-4461-8F48-B77EB2693C89", "vulnerable": true }, { "criteria": "cpe:2.3:a:powerdns:recursor:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "38DDFF27-8CBB-468D-9837-C74538E5EF0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:powerdns:recursor:3.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "B3920499-3580-4EA6-AD56-6515C3B8495A", "vulnerable": true }, { "criteria": "cpe:2.3:a:powerdns:recursor:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "AF444F17-46F1-4036-B5F1-CA04F7F19684", "vulnerable": true }, { "criteria": "cpe:2.3:a:powerdns:recursor:3.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "FA1E4934-6690-4A09-8E6E-FE7ED57B9DEE", "vulnerable": true }, { "criteria": "cpe:2.3:a:powerdns:recursor:3.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "D474CF9D-1898-46D3-80B1-2D3743265F56", "vulnerable": true }, { "criteria": "cpe:2.3:a:powerdns:recursor:3.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "E18F9C22-04BB-4081-89E0-E6989970EBCD", "vulnerable": true }, { "criteria": "cpe:2.3:a:powerdns:recursor:3.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "FD3E469E-EAE5-4BF1-BB69-6445FBBF96FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:powerdns:recursor:3.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "5333FFD9-9287-4DD8-BD23-5CA3F575313F", "vulnerable": true }, { "criteria": "cpe:2.3:a:powerdns:recursor:3.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "5EC1BD97-DB54-48D1-955E-9F935CDE07C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:powerdns:recursor:3.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "82DFE95C-19B3-4F48-AE74-3D884D86D0DE", "vulnerable": true }, { "criteria": "cpe:2.3:a:powerdns:recursor:3.1.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "45D27722-962A-4F0A-AEC0-CDC253F7F857", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in PowerDNS Recursor before 3.1.7.2 allows remote attackers to spoof DNS data via crafted zones." }, { "lang": "es", "value": "Vulnerabilidad sin especificar en PowerDNS Recursor anterior a v3.1.7.2 permite a atacantes remotos suplantar datos DNS a trav\u00e9s de zonas manipuladas." } ], "id": "CVE-2009-4010", "lastModified": "2024-11-21T01:08:43.723", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2010-01-08T17:30:02.287", "references": [ { "source": "cve@mitre.org", "url": "http://doc.powerdns.com/powerdns-advisory-2010-02.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/38004" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/38068" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1023404" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/508743/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/37653" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/0054" }, { "source": "cve@mitre.org", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=552285" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/55439" }, { "source": "cve@mitre.org", "url": "https://www.redhat.com/archives/fedora-package-announce/2010-January/msg00217.html" }, { "source": "cve@mitre.org", "url": "https://www.redhat.com/archives/fedora-package-announce/2010-January/msg00228.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://doc.powerdns.com/powerdns-advisory-2010-02.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/38004" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/38068" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1023404" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/508743/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/37653" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/0054" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=552285" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/55439" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.redhat.com/archives/fedora-package-announce/2010-January/msg00217.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.redhat.com/archives/fedora-package-announce/2010-January/msg00228.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | http://www.securityfocus.com/bid/101982 | Third Party Advisory, VDB Entry | |
secalert@redhat.com | https://doc.powerdns.com/recursor/security-advisories/powerdns-advisory-2017-07.html | Mitigation, Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/101982 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://doc.powerdns.com/recursor/security-advisories/powerdns-advisory-2017-07.html | Mitigation, Patch, Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:powerdns:recursor:*:*:*:*:*:*:*:*", "matchCriteriaId": "94094CC8-C228-40FF-BA81-FD93082D99A2", "versionEndIncluding": "4.0.6", "versionStartIncluding": "4.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue has been found in the DNSSEC parsing code of PowerDNS Recursor from 4.0.0 up to and including 4.0.6 leading to a memory leak when parsing specially crafted DNSSEC ECDSA keys. These keys are only parsed when validation is enabled by setting dnssec to a value other than off or process-no-validate (default)." }, { "lang": "es", "value": "Se ha encontrado un problema en el c\u00f3digo de an\u00e1lisis DNSSEC de PowerDNS Recursor, desde la versi\u00f3n 4.0.0 hasta la 4.0.6, tambi\u00e9n incluida, lo que conduce a una fuga de memoria al analizar claves DNSSEC ECDSA especialmente manipuladas. Estas claves solo se analizan cuando la validaci\u00f3n est\u00e1 habilitada mediante la configuraci\u00f3n de dnssec a un valor distinto de off o process-no-validate (por defecto)." } ], "id": "CVE-2017-15094", "lastModified": "2024-11-21T03:14:03.510", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 2.2, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-01-23T15:29:00.417", "references": [ { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/101982" }, { "source": "secalert@redhat.com", "tags": [ "Mitigation", "Patch", "Vendor Advisory" ], "url": "https://doc.powerdns.com/recursor/security-advisories/powerdns-advisory-2017-07.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/101982" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mitigation", "Patch", "Vendor Advisory" ], "url": "https://doc.powerdns.com/recursor/security-advisories/powerdns-advisory-2017-07.html" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-401" } ], "source": "secalert@redhat.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-772" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
powerdns | authoritative | * | |
powerdns | authoritative | 3.4.0 | |
powerdns | authoritative | 3.4.1 | |
powerdns | authoritative | 3.4.2 | |
powerdns | authoritative | 3.4.3 | |
powerdns | authoritative | 3.4.4 | |
powerdns | recursor | * | |
powerdns | recursor | 3.7.1 | |
powerdns | recursor | 3.7.2 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:powerdns:authoritative:*:*:*:*:*:*:*:*", "matchCriteriaId": "BF978920-5AEA-4B22-9ACC-E8CFD9BCC121", "versionEndIncluding": "3.3.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:powerdns:authoritative:3.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "04A975C2-F387-4815-BDD7-F712AFFE1CE3", "vulnerable": true }, { "criteria": "cpe:2.3:a:powerdns:authoritative:3.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "91211D89-B43C-4D26-8ADE-90EEAFA44603", "vulnerable": true }, { "criteria": "cpe:2.3:a:powerdns:authoritative:3.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "D3F120B2-C520-406E-A6A7-7E710D434FE4", "vulnerable": true }, { "criteria": "cpe:2.3:a:powerdns:authoritative:3.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "3CA372BE-95F8-48BA-A1AF-D9FEDF01AC18", "vulnerable": true }, { "criteria": "cpe:2.3:a:powerdns:authoritative:3.4.4:*:*:*:*:*:*:*", "matchCriteriaId": "1700CF93-6C36-4395-92C4-708B4CE9861D", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:powerdns:recursor:*:*:*:*:*:*:*:*", "matchCriteriaId": "AD93A3D6-4421-493B-863A-83983289DD0F", "versionEndIncluding": "3.6.3", "vulnerable": true }, { "criteria": "cpe:2.3:a:powerdns:recursor:3.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "79723D52-8A9E-42B5-AF68-4DBF4758783E", "vulnerable": true }, { "criteria": "cpe:2.3:a:powerdns:recursor:3.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "258E1BC4-F4A8-4A2A-9766-F6BB10C982C7", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The label decompression functionality in PowerDNS Recursor before 3.6.4 and 3.7.x before 3.7.3 and Authoritative (Auth) Server before 3.3.3 and 3.4.x before 3.4.5 allows remote attackers to cause a denial of service (CPU consumption or crash) via a request with a long name that refers to itself. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-1868." }, { "lang": "es", "value": "La funcionalidad de descompresi\u00f3n de etiqueta en PowerDNS Recursor en versiones anteriores a 3.6.4 y 3.7.x en versiones anteriores a 3.7.3 y Authoritative (Auth) Server en versiones anteriores a 3.3.3 y 3.4.x en versiones anteriores a 3.4.5 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (consumo de CPU o ca\u00edda) a trav\u00e9s de una petici\u00f3n con un nombre largo que se refiere a s\u00ed mismo. NOTA: esta vulnerabilidad existe debido a una soluci\u00f3n incompleta para CVE-2015-1868." } ], "id": "CVE-2015-5470", "lastModified": "2024-11-21T02:33:05.253", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2015-11-02T19:59:09.530", "references": [ { "source": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2015/07/07/6" }, { "source": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2015/07/10/8" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://doc.powerdns.com/md/security/powerdns-advisory-2015-01/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2015/07/07/6" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2015/07/10/8" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://doc.powerdns.com/md/security/powerdns-advisory-2015-01/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-399" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
powerdns | authoritative | 3.2 | |
powerdns | authoritative | 3.3 | |
powerdns | authoritative | 3.3.1 | |
powerdns | authoritative | 3.3.2 | |
powerdns | authoritative | 3.4.0 | |
powerdns | authoritative | 3.4.1 | |
powerdns | authoritative | 3.4.3 | |
fedoraproject | fedora | 20 | |
fedoraproject | fedora | 21 | |
fedoraproject | fedora | 22 | |
powerdns | recursor | 3.5 | |
powerdns | recursor | 3.5.1 | |
powerdns | recursor | 3.5.2 | |
powerdns | recursor | 3.5.3 | |
powerdns | recursor | 3.6.0 | |
powerdns | recursor | 3.6.1 | |
powerdns | recursor | 3.6.2 | |
powerdns | recursor | 3.6.3 | |
powerdns | recursor | 3.7.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:powerdns:authoritative:3.2:*:*:*:*:*:*:*", "matchCriteriaId": "F5604347-1CAB-4BF7-A173-836B6EB16783", "vulnerable": true }, { "criteria": "cpe:2.3:a:powerdns:authoritative:3.3:*:*:*:*:*:*:*", "matchCriteriaId": "F3370E07-8781-40EF-B265-2A3723E41F78", "vulnerable": true }, { "criteria": "cpe:2.3:a:powerdns:authoritative:3.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "BEC5141A-8472-4A36-8A6D-124EDFE0941A", "vulnerable": true }, { "criteria": "cpe:2.3:a:powerdns:authoritative:3.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "4AF8596A-D92F-4FEB-8B63-D6FDAD608792", "vulnerable": true }, { "criteria": "cpe:2.3:a:powerdns:authoritative:3.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "04A975C2-F387-4815-BDD7-F712AFFE1CE3", "vulnerable": true }, { "criteria": "cpe:2.3:a:powerdns:authoritative:3.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "91211D89-B43C-4D26-8ADE-90EEAFA44603", "vulnerable": true }, { "criteria": "cpe:2.3:a:powerdns:authoritative:3.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "3CA372BE-95F8-48BA-A1AF-D9FEDF01AC18", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*", "matchCriteriaId": "FF47C9F0-D8DA-4B55-89EB-9B2C9383ADB9", "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*", "matchCriteriaId": "56BDB5A0-0839-4A20-A003-B8CD56F48171", "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*", "matchCriteriaId": "253C303A-E577-4488-93E6-68A8DD942C38", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:powerdns:recursor:3.5:*:*:*:*:*:*:*", "matchCriteriaId": "A3B8B634-42DC-4552-AAFB-D6849CB459C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:powerdns:recursor:3.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "A1CF2AEB-1D4D-4F80-BBFE-071942C6C9AA", "vulnerable": true }, { "criteria": "cpe:2.3:a:powerdns:recursor:3.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "F0F59252-BF7E-4C15-A8EE-F96DCDABB2FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:powerdns:recursor:3.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "ABCDEABD-572D-42BD-8A2B-1E97FFF17B3F", "vulnerable": true }, { "criteria": "cpe:2.3:a:powerdns:recursor:3.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "0A3DFC6B-B0C3-499C-9AE6-8974A2681974", "vulnerable": true }, { "criteria": "cpe:2.3:a:powerdns:recursor:3.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "6B325D31-8746-4811-B3AD-3CC1F02D0E18", "vulnerable": true }, { "criteria": "cpe:2.3:a:powerdns:recursor:3.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "70D0E4BB-34A1-4E94-A58B-25DD7C984815", "vulnerable": true }, { "criteria": "cpe:2.3:a:powerdns:recursor:3.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "6BC3F136-8B89-48DE-81A6-2D3FA9BE6A0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:powerdns:recursor:3.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "79723D52-8A9E-42B5-AF68-4DBF4758783E", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The label decompression functionality in PowerDNS Recursor 3.5.x, 3.6.x before 3.6.3, and 3.7.x before 3.7.2 and Authoritative (Auth) Server 3.2.x, 3.3.x before 3.3.2, and 3.4.x before 3.4.4 allows remote attackers to cause a denial of service (CPU consumption or crash) via a request with a name that refers to itself." }, { "lang": "es", "value": "La funcionalidad de la decompresi\u00f3n de etiquetas en PowerDNS Recursor 3.5.x, 3.6.x anterior a 3.6.3, y 3.7.x anterior a 3.7.2 y Authoritative (Auth) Server 3.2.x, 3.3.x anterior a 3.3.2, y 3.4.x anterior a 3.4.4 permite a atacantes remotos causar una denegaci\u00f3n de servicio (consumo de CPU o ca\u00edda) a trav\u00e9s de una solicitud con un nombre que se hace referencia a si mismo." } ], "id": "CVE-2015-1868", "lastModified": "2024-11-21T02:26:18.213", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2015-05-18T15:59:05.823", "references": [ { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156648.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156655.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156667.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156680.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156725.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156743.html" }, { "source": "secalert@redhat.com", "url": "http://www.debian.org/security/2015/dsa-3306" }, { "source": "secalert@redhat.com", "url": "http://www.debian.org/security/2015/dsa-3307" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www.securityfocus.com/bid/74306" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www.securitytracker.com/id/1032220" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156648.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156655.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156667.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156680.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156725.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156743.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2015/dsa-3306" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2015/dsa-3307" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.securityfocus.com/bid/74306" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.securitytracker.com/id/1032220" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-399" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | http://www.securityfocus.com/bid/101982 | Third Party Advisory, VDB Entry | |
secalert@redhat.com | https://doc.powerdns.com/recursor/security-advisories/powerdns-advisory-2017-05.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/101982 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://doc.powerdns.com/recursor/security-advisories/powerdns-advisory-2017-05.html | Patch, Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:powerdns:recursor:*:*:*:*:*:*:*:*", "matchCriteriaId": "94094CC8-C228-40FF-BA81-FD93082D99A2", "versionEndIncluding": "4.0.6", "versionStartIncluding": "4.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A cross-site scripting issue has been found in the web interface of PowerDNS Recursor from 4.0.0 up to and including 4.0.6, where the qname of DNS queries was displayed without any escaping, allowing a remote attacker to inject HTML and Javascript code into the web interface, altering the content." }, { "lang": "es", "value": "Se ha encontrado un problema de Cross-Site Scripting (XSS) en la interfaz web de PowerDNS Recursor, desde la versi\u00f3n 4.0.0 hasta la versi\u00f3n 4.0.6, tambi\u00e9n incluida, en la que el qname de las consultas DNS se mostraba sin escape. Esto permit\u00eda que un atacante remoto inyecte c\u00f3digo HTML y JavaScript en la interfaz web, alterando el contenido." } ], "id": "CVE-2017-15092", "lastModified": "2024-11-21T03:14:03.277", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-01-23T15:29:00.323", "references": [ { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/101982" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://doc.powerdns.com/recursor/security-advisories/powerdns-advisory-2017-05.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/101982" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://doc.powerdns.com/recursor/security-advisories/powerdns-advisory-2017-05.html" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "secalert@redhat.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
powerdns | authoritative_server | * | |
powerdns | authoritative_server | * | |
powerdns | authoritative_server | * | |
powerdns | recursor | * | |
powerdns | recursor | * | |
powerdns | recursor | * | |
fedoraproject | fedora | 34 | |
fedoraproject | fedora | 35 | |
fedoraproject | fedora | 36 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:powerdns:authoritative_server:*:*:*:*:*:*:*:*", "matchCriteriaId": "DCD7F9FC-4CAE-46E3-80D5-2B9BAA9F533C", "versionEndExcluding": "4.4.3", "vulnerable": true }, { "criteria": "cpe:2.3:a:powerdns:authoritative_server:*:*:*:*:*:*:*:*", "matchCriteriaId": "34C2C5FE-1774-490E-8D58-81F1B3AC2395", "versionEndExcluding": "4.5.4", "versionStartIncluding": "4.5.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:powerdns:authoritative_server:*:*:*:*:*:*:*:*", "matchCriteriaId": "43B78B87-BE48-4512-81B4-CA185803BF9C", "versionEndExcluding": "4.6.1", "versionStartIncluding": "4.6.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:powerdns:recursor:*:*:*:*:*:*:*:*", "matchCriteriaId": "C4D5A80E-5316-477B-938D-9AB9293010DC", "versionEndExcluding": "4.4.8", "vulnerable": true }, { "criteria": "cpe:2.3:a:powerdns:recursor:*:*:*:*:*:*:*:*", "matchCriteriaId": "6110108D-1977-4316-A0CA-B2C143786DE2", "versionEndExcluding": "4.5.8", "versionStartIncluding": "4.5.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:powerdns:recursor:*:*:*:*:*:*:*:*", "matchCriteriaId": "2B7B0CEF-EBC9-4B58-9F40-E9598C39B1E0", "versionEndExcluding": "4.6.1", "versionStartIncluding": "4.6.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*", "matchCriteriaId": "A930E247-0B43-43CB-98FF-6CE7B8189835", "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*", "matchCriteriaId": "80E516C0-98A4-4ADE-B69F-66A772E2BAAA", "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*", "matchCriteriaId": "5C675112-476C-4D7C-BCB9-A2FB2D0BC9FD", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In PowerDNS Authoritative Server before 4.4.3, 4.5.x before 4.5.4, and 4.6.x before 4.6.1 and PowerDNS Recursor before 4.4.8, 4.5.x before 4.5.8, and 4.6.x before 4.6.1, insufficient validation of an IXFR end condition causes incomplete zone transfers to be handled as successful transfers." }, { "lang": "es", "value": "En PowerDNS Authoritative Server versiones anteriores a 4.4.3, versiones 4.5.x anteriores a 4.5.4 y versiones4.6.x anteriores a 4.6.1 y PowerDNS Recursor versiones anteriores a 4.4.8, versiones 4.5.x anteriores a 4.5.8 y versiones 4.6.x anteriores a 4.6.1, una comprobaci\u00f3n insuficiente de una condici\u00f3n de fin de IXFR causa que las transferencias de zona incompletas sean manejadas como transferencias con \u00e9xito" } ], "id": "CVE-2022-27227", "lastModified": "2024-11-21T06:55:27.090", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-03-25T15:15:07.697", "references": [ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Patch", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2022/03/25/1" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://doc.powerdns.com/authoritative/security-advisories/index.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://doc.powerdns.com/authoritative/security-advisories/powerdns-advisory-2022-01.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://docs.powerdns.com/recursor/security-advisories/index.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2022-01.html" }, { "source": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2QKN56VWXUVFOYGUN75N5IRNK66OHTHT/" }, { "source": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HEABZA46XYEUWMGSY2GYYVHISBVWEHIO/" }, { "source": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IPHOFNI7FKM5NNOVDOWO4TBXFAFICCUE/" }, { "source": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZJSKICB67SPPEGNXCQLZVSWR6QGCN3KP/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Patch", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2022/03/25/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://doc.powerdns.com/authoritative/security-advisories/index.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://doc.powerdns.com/authoritative/security-advisories/powerdns-advisory-2022-01.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://docs.powerdns.com/recursor/security-advisories/index.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2022-01.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2QKN56VWXUVFOYGUN75N5IRNK66OHTHT/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HEABZA46XYEUWMGSY2GYYVHISBVWEHIO/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IPHOFNI7FKM5NNOVDOWO4TBXFAFICCUE/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZJSKICB67SPPEGNXCQLZVSWR6QGCN3KP/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:powerdns:recursor:*:*:*:*:*:*:*:*", "matchCriteriaId": "BA646A7D-281C-42A3-871D-52717568E9E1", "versionEndExcluding": "4.1.18", "vulnerable": true }, { "criteria": "cpe:2.3:a:powerdns:recursor:*:*:*:*:*:*:*:*", "matchCriteriaId": "50CF7B72-84F0-4AC6-B0E4-FCAF4F6AAC1E", "versionEndExcluding": "4.2.5", "versionStartIncluding": "4.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:powerdns:recursor:*:*:*:*:*:*:*:*", "matchCriteriaId": "4EA496E5-4565-4D4A-A0A3-F1B95D33B53E", "versionEndExcluding": "4.3.5", "versionStartIncluding": "4.3.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:opensuse:backports_sle:15.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "40513095-7E6E-46B3-B604-C926F1BA3568", "vulnerable": true }, { "criteria": "cpe:2.3:a:opensuse:backports_sle:15.0:sp2:*:*:*:*:*:*", "matchCriteriaId": "67E82302-4B77-44F3-97B1-24C18AC4A35D", "vulnerable": true }, { "criteria": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", "matchCriteriaId": "B620311B-34A3-48A6-82DF-6F078D7A4493", "vulnerable": true }, { "criteria": "cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*", "matchCriteriaId": "B009C22E-30A4-4288-BCF6-C3E81DEAF45A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue has been found in PowerDNS Recursor before 4.1.18, 4.2.x before 4.2.5, and 4.3.x before 4.3.5. A remote attacker can cause the cached records for a given name to be updated to the Bogus DNSSEC validation state, instead of their actual DNSSEC Secure state, via a DNS ANY query. This results in a denial of service for installation that always validate (dnssec=validate), and for clients requesting validation when on-demand validation is enabled (dnssec=process)." }, { "lang": "es", "value": "Se ha encontrado un problema en PowerDNS Recursor versiones anteriores a 4.1.18, versiones 4.2.x anteriores a 4.2.5 y versiones 4.3.x anteriores a 4.3.5.\u0026#xa0;Un atacante remoto puede causar que los registros en cach\u00e9 para un nombre dado sean actualizados al estado de comprobaci\u00f3n de Bogus DNSSEC, en lugar de su estado DNSSEC Secure real, por medio de una consulta ANY de DNS.\u0026#xa0;Esto resulta en una denegaci\u00f3n de servicio para la instalaci\u00f3n que siempre comprueba (dnssec=validate) y para los clientes que requieren comprobaci\u00f3n cuando la comprobaci\u00f3n bajo demanda est\u00e1 habilitada (dnssec=process)" } ], "id": "CVE-2020-25829", "lastModified": "2024-11-21T05:18:51.467", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-10-16T06:15:12.357", "references": [ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00036.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2020-07.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202012-19" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00036.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2020-07.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202012-19" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | http://www.securityfocus.com/bid/101982 | Third Party Advisory, VDB Entry | |
secalert@redhat.com | https://doc.powerdns.com/recursor/security-advisories/powerdns-advisory-2017-03.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/101982 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://doc.powerdns.com/recursor/security-advisories/powerdns-advisory-2017-03.html | Patch, Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:powerdns:recursor:*:*:*:*:*:*:*:*", "matchCriteriaId": "94094CC8-C228-40FF-BA81-FD93082D99A2", "versionEndIncluding": "4.0.6", "versionStartIncluding": "4.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue has been found in the DNSSEC validation component of PowerDNS Recursor from 4.0.0 and up to and including 4.0.6, where the signatures might have been accepted as valid even if the signed data was not in bailiwick of the DNSKEY used to sign it. This allows an attacker in position of man-in-the-middle to alter the content of records by issuing a valid signature for the crafted records." }, { "lang": "es", "value": "Se ha descubierto un problema en el componente de validaci\u00f3n DNSSEC de PowerDNS Recursor, desde la versi\u00f3n 4.0.0 hasta la versi\u00f3n 4.0.6, tambi\u00e9n incluida, en el que las firmas podr\u00edan haber sido aceptadas como v\u00e1lidas incluso aunque los datos firmados no estuvieran en el territorio del DNSKEY empleado para firmarlo. Esto permite que un atacante en posici\u00f3n Man-in-the-Middle (MitM) altere el contenido de los registros enviando una firma v\u00e1lida para los registros manipulados." } ], "id": "CVE-2017-15090", "lastModified": "2024-11-21T03:14:03.050", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "exploitabilityScore": 2.2, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-01-23T15:29:00.213", "references": [ { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/101982" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://doc.powerdns.com/recursor/security-advisories/powerdns-advisory-2017-03.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/101982" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://doc.powerdns.com/recursor/security-advisories/powerdns-advisory-2017-03.html" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-347" } ], "source": "secalert@redhat.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-347" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
7.5 (High) - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Vendor | Product | Version | |
---|---|---|---|
powerdns | authoritative | * | |
powerdns | recursor | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:powerdns:authoritative:*:*:*:*:*:*:*:*", "matchCriteriaId": "5C2FEED8-6595-4DE8-8A03-8ADD39BADCC9", "versionEndIncluding": "4.1.4", "versionStartIncluding": "3.3", "vulnerable": true }, { "criteria": "cpe:2.3:a:powerdns:recursor:*:*:*:*:*:*:*:*", "matchCriteriaId": "9E64C51F-8B86-4454-9160-FE549AA481ED", "versionEndIncluding": "4.1.4", "versionStartIncluding": "3.2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "PowerDNS Authoritative Server 3.3.0 up to 4.1.4 excluding 4.1.5 and 4.0.6, and PowerDNS Recursor 3.2 up to 4.1.4 excluding 4.1.5 and 4.0.9, are vulnerable to a memory leak while parsing malformed records that can lead to remote denial of service." }, { "lang": "es", "value": "PowerDNS Authoritative Server desde la versi\u00f3n 3.3.0 hasta la 4.1.4 excluyendo las versiones 4.1.5 y 4.0.6, y PowerDNS Recursor desde la versi\u00f3n 3.2 hasta la 4.1.4 excluyendo las versiones 4.1.5 y 4.0.9, son vulnerables a una fuga de memoria cuando se analizan registros mal formados que pueden conducir a una denegaci\u00f3n de servicio (DoS) remota." } ], "id": "CVE-2018-10851", "lastModified": "2024-11-21T03:42:08.410", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 1.6, "impactScore": 3.6, "source": "secalert@redhat.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-11-29T18:29:00.303", "references": [ { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10851" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "https://doc.powerdns.com/authoritative/security-advisories/powerdns-advisory-2018-03.html" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "https://doc.powerdns.com/recursor/security-advisories/powerdns-advisory-2018-04.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10851" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://doc.powerdns.com/authoritative/security-advisories/powerdns-advisory-2018-03.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://doc.powerdns.com/recursor/security-advisories/powerdns-advisory-2018-04.html" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-400" } ], "source": "secalert@redhat.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-772" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3806 | Issue Tracking, Third Party Advisory | |
secalert@redhat.com | https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2019-01.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3806 | Issue Tracking, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2019-01.html | Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:powerdns:recursor:*:*:*:*:*:*:*:*", "matchCriteriaId": "C0CFD9B8-8320-41FB-9AFF-D9B7B7FE4BC8", "versionEndExcluding": "4.1.9", "versionStartIncluding": "4.1.4", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue has been found in PowerDNS Recursor versions after 4.1.3 before 4.1.9 where Lua hooks are not properly applied to queries received over TCP in some specific combination of settings, possibly bypassing security policies enforced using Lua." }, { "lang": "es", "value": "Se ha encontrado un problema en PowerDNS Recursor, desde la versi\u00f3n 4.1.3 hasta la 4.1.9, en el que los enlaces de Lua no se aplican correctamente a las consultas recibidas por TCP en alguna combinaci\u00f3n espec\u00edfica de opciones, pudiendo omitir las pol\u00edticas de seguridad aplicadas con Lua." } ], "id": "CVE-2019-3806", "lastModified": "2024-11-21T04:42:34.750", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 1.2, "impactScore": 4.2, "source": "secalert@redhat.com", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-01-29T17:29:00.287", "references": [ { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3806" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2019-01.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3806" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2019-01.html" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-358" } ], "source": "secalert@redhat.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
7.5 (High) - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
▼ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16855 | Issue Tracking, Third Party Advisory | |
secalert@redhat.com | https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2018-09.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16855 | Issue Tracking, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2018-09.html | Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:powerdns:recursor:*:*:*:*:*:*:*:*", "matchCriteriaId": "64CEF467-CBA0-4ADA-B42F-967407FEAA1D", "versionEndExcluding": "4.1.8", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue has been found in PowerDNS Recursor before version 4.1.8 where a remote attacker sending a DNS query can trigger an out-of-bounds memory read while computing the hash of the query for a packet cache lookup, possibly leading to a crash." }, { "lang": "es", "value": "Se ha detectado un problema en PowerDNS Recursor en versiones anteriores a la 4.1.8 en donde un atacante remoto que env\u00ede una consulta DNS puede desencadenar una lectura de memoria fuera de l\u00edmites cuando procesa el hash de la consulta para una b\u00fasqueda de memoria cach\u00e9 de los paquetes, posiblemente conduciendo a a un cierre inesperado." } ], "id": "CVE-2018-16855", "lastModified": "2024-11-21T03:53:27.307", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "secalert@redhat.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-12-03T14:29:00.257", "references": [ { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16855" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2018-09.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16855" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2018-09.html" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-125" } ], "source": "secalert@redhat.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-125" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
9.8 (Critical) - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
▼ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3807 | Issue Tracking, Third Party Advisory | |
secalert@redhat.com | https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2019-02.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3807 | Issue Tracking, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2019-02.html | Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:powerdns:recursor:*:*:*:*:*:*:*:*", "matchCriteriaId": "EFFE6AED-480B-4A19-9DD9-C8445ADBBC90", "versionEndIncluding": "4.1.8", "versionStartIncluding": "4.1.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue has been found in PowerDNS Recursor versions 4.1.x before 4.1.9 where records in the answer section of responses received from authoritative servers with the AA flag not set were not properly validated, allowing an attacker to bypass DNSSEC validation." }, { "lang": "es", "value": "Se ha encontrado un problema en PowerDNS Recursor, en versiones 4.1.x anteriores a la 4.1.9, en el que los registros en la secci\u00f3n \"answers\" de las respuestas recibidas desde servidores autoritativos sin el flag AA no se validaban correctamente, lo que permite que un atacante omita la validaci\u00f3n DNSSEC." } ], "id": "CVE-2019-3807", "lastModified": "2024-11-21T04:42:34.870", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 1.2, "impactScore": 2.5, "source": "secalert@redhat.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-01-29T17:29:00.350", "references": [ { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3807" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2019-02.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3807" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2019-02.html" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-345" } ], "source": "secalert@redhat.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-295" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:powerdns:recursor:*:*:*:*:*:*:*:*", "matchCriteriaId": "9CF23533-E208-46EA-AD26-311F66A62358", "versionEndIncluding": "4.3.0", "versionStartIncluding": "4.1.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue has been found in PowerDNS Recursor 4.1.0 up to and including 4.3.0. It allows an attacker (with enough privileges to change the system\u0027s hostname) to cause disclosure of uninitialized memory content via a stack-based out-of-bounds read. It only occurs on systems where gethostname() does not have \u0027\\0\u0027 termination of the returned string if the hostname is larger than the supplied buffer. (Linux systems are not affected because the buffer is always large enough. OpenBSD systems are not affected because the returned hostname always has \u0027\\0\u0027 termination.) Under some conditions, this issue can lead to the writing of one \u0027\\0\u0027 byte out-of-bounds on the stack, causing a denial of service or possibly arbitrary code execution." }, { "lang": "es", "value": "Se ha detectado un problema en PowerDNS Recursor versiones 4.1.0 hasta 4.3.0 en incluy\u00e9ndola. Permite un atacante (con suficientes privilegios para cambiar el nombre de host del sistema) causar una divulgaci\u00f3n del contenido de la memoria no inicializada por medio de una lectura fuera de l\u00edmites en la regi\u00f3n stack de la memoria. Solo se presenta en sistemas donde la funci\u00f3n gethostname() no contiene la terminaci\u00f3n \"\\0\" de la cadena devuelta si el nombre de host es mayor que el b\u00fafer suministrado. (Los sistemas Linux no est\u00e1n afectados porque el b\u00fafer siempre es lo suficientemente grande. Los sistemas OpenBSD no est\u00e1n afectados porque el nombre de host devuelto siempre presenta una terminaci\u00f3n \"\\0\".) Bajo algunas condiciones, este problema puede conllevar a una escritura de un byte \u0027\\ 0\u0027 fuera de los l\u00edmites en la pila, causando una denegaci\u00f3n de servicio o posiblemente una ejecuci\u00f3n de c\u00f3digo arbitraria." } ], "id": "CVE-2020-10030", "lastModified": "2024-11-21T04:54:41.057", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-05-19T16:15:10.917", "references": [ { "source": "cve@mitre.org", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00052.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://doc.powerdns.com/recursor/security-advisories/powerdns-advisory-2020-03.html" }, { "source": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NMP72NJGKBWR5WEBXAWX5KSLQUDFTG6S/" }, { "source": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PS4ZN5XGENYNFKX7QIIOUCQQHXE37GJF/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00052.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://doc.powerdns.com/recursor/security-advisories/powerdns-advisory-2020-03.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NMP72NJGKBWR5WEBXAWX5KSLQUDFTG6S/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PS4ZN5XGENYNFKX7QIIOUCQQHXE37GJF/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-125" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
powerdns | recursor | * | |
powerdns | recursor | 2.0_rc1 | |
powerdns | recursor | 2.8 | |
powerdns | recursor | 2.9.15 | |
powerdns | recursor | 2.9.16 | |
powerdns | recursor | 2.9.17 | |
powerdns | recursor | 2.9.18 | |
powerdns | recursor | 3.0 | |
powerdns | recursor | 3.0.1 | |
powerdns | recursor | 3.1 | |
powerdns | recursor | 3.1.1 | |
powerdns | recursor | 3.1.2 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:powerdns:recursor:*:*:*:*:*:*:*:*", "matchCriteriaId": "0FF03280-64C9-43E0-8A79-DDAFAF049119", "versionEndIncluding": "3.1.3", "vulnerable": true }, { "criteria": "cpe:2.3:a:powerdns:recursor:2.0_rc1:*:*:*:*:*:*:*", "matchCriteriaId": "E02559EA-6C7F-4328-A435-B4F69E640645", "vulnerable": true }, { "criteria": "cpe:2.3:a:powerdns:recursor:2.8:*:*:*:*:*:*:*", "matchCriteriaId": "D390616D-8CAB-46D3-864D-09AF99E3A407", "vulnerable": true }, { "criteria": "cpe:2.3:a:powerdns:recursor:2.9.15:*:*:*:*:*:*:*", "matchCriteriaId": "47DFAA6A-CA5B-4B2A-BFC2-A0DF85BF68D8", "vulnerable": true }, { "criteria": "cpe:2.3:a:powerdns:recursor:2.9.16:*:*:*:*:*:*:*", "matchCriteriaId": "306EBF4B-2292-4B14-9835-9FD0E82FE7CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:powerdns:recursor:2.9.17:*:*:*:*:*:*:*", "matchCriteriaId": "3A31C83E-8A81-4483-A245-FD1C08684183", "vulnerable": true }, { "criteria": "cpe:2.3:a:powerdns:recursor:2.9.18:*:*:*:*:*:*:*", "matchCriteriaId": "44D51FCC-8AD6-4461-8F48-B77EB2693C89", "vulnerable": true }, { "criteria": "cpe:2.3:a:powerdns:recursor:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "38DDFF27-8CBB-468D-9837-C74538E5EF0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:powerdns:recursor:3.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "B3920499-3580-4EA6-AD56-6515C3B8495A", "vulnerable": true }, { "criteria": "cpe:2.3:a:powerdns:recursor:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "AF444F17-46F1-4036-B5F1-CA04F7F19684", "vulnerable": true }, { "criteria": "cpe:2.3:a:powerdns:recursor:3.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "FA1E4934-6690-4A09-8E6E-FE7ED57B9DEE", "vulnerable": true }, { "criteria": "cpe:2.3:a:powerdns:recursor:3.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "D474CF9D-1898-46D3-80B1-2D3743265F56", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer overflow in PowerDNS Recursor 3.1.3 and earlier might allow remote attackers to execute arbitrary code via a malformed TCP DNS query that prevents Recursor from properly calculating the TCP DNS query length." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer en PowerDNS Recursor 3.1.3 y anteriores puede que permita a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n mediante consultas TCP DNS mal formadas que previene a Recursor de calcular correctamente la longitud de una consulta TCP DNS." } ], "evaluatorSolution": "This vulnerability is addressed in the following product release:\r\nPowerDNS, Recursor, 3.1.4", "id": "CVE-2006-4251", "lastModified": "2024-11-21T00:15:29.607", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": true, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2006-11-14T19:07:00.000", "references": [ { "source": "security@debian.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://doc.powerdns.com/powerdns-advisory-2006-01.html" }, { "source": "security@debian.org", "url": "http://lists.suse.com/archive/suse-security-announce/2006-Nov/0007.html" }, { "source": "security@debian.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/22824" }, { "source": "security@debian.org", "url": "http://secunia.com/advisories/22903" }, { "source": "security@debian.org", "url": "http://secunia.com/advisories/22976" }, { "source": "security@debian.org", "url": "http://www.debian.org/security/2006/dsa-1211" }, { "source": "security@debian.org", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/21037" }, { "source": "security@debian.org", "url": "http://www.vupen.com/english/advisories/2006/4484" }, { "source": "security@debian.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30270" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://doc.powerdns.com/powerdns-advisory-2006-01.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.suse.com/archive/suse-security-announce/2006-Nov/0007.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/22824" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/22903" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/22976" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2006/dsa-1211" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/21037" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2006/4484" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30270" } ], "sourceIdentifier": "security@debian.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://www.openwall.com/lists/oss-security/2023/01/20/1 | Mailing List, Release Notes, Third Party Advisory | |
cve@mitre.org | https://docs.powerdns.com/recursor/changelog/4.8.html#change-4.8.1 | Release Notes, Vendor Advisory | |
cve@mitre.org | https://docs.powerdns.com/recursor/security-advisories/ | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2023/01/20/1 | Mailing List, Release Notes, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://docs.powerdns.com/recursor/changelog/4.8.html#change-4.8.1 | Release Notes, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://docs.powerdns.com/recursor/security-advisories/ | Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:powerdns:recursor:4.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "555D9C8B-4356-4078-8515-81F9C3B6CF74", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A remote attacker might be able to cause infinite recursion in PowerDNS Recursor 4.8.0 via a DNS query that retrieves DS records for a misconfigured domain, because QName minimization is used in QM fallback mode. This is fixed in 4.8.1." }, { "lang": "es", "value": "Un atacante remoto podr\u00eda provocar una recursividad infinita en PowerDNS Recursor 4.8.0 a trav\u00e9s de una consulta DNS que recupera registros DS para un dominio mal configurado, porque la minimizaci\u00f3n de QName se utiliza en el modo de reserva de QM. Esto se solucion\u00f3 en 4.8.1." } ], "id": "CVE-2023-22617", "lastModified": "2024-11-21T07:45:04.050", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-01-21T19:15:11.077", "references": [ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Release Notes", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2023/01/20/1" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://docs.powerdns.com/recursor/changelog/4.8.html#change-4.8.1" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://docs.powerdns.com/recursor/security-advisories/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Release Notes", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2023/01/20/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://docs.powerdns.com/recursor/changelog/4.8.html#change-4.8.1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://docs.powerdns.com/recursor/security-advisories/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-674" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | http://www.securityfocus.com/bid/101982 | Third Party Advisory, VDB Entry | |
secalert@redhat.com | https://doc.powerdns.com/recursor/security-advisories/powerdns-advisory-2017-06.html | Mitigation, Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/101982 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://doc.powerdns.com/recursor/security-advisories/powerdns-advisory-2017-06.html | Mitigation, Patch, Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:powerdns:recursor:*:*:*:*:*:*:*:*", "matchCriteriaId": "26A2DE9E-6667-41DF-9BFA-CC0688094368", "versionEndIncluding": "3.7.4", "versionStartIncluding": "3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:powerdns:recursor:*:*:*:*:*:*:*:*", "matchCriteriaId": "94094CC8-C228-40FF-BA81-FD93082D99A2", "versionEndIncluding": "4.0.6", "versionStartIncluding": "4.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "When api-config-dir is set to a non-empty value, which is not the case by default, the API in PowerDNS Recursor 4.x up to and including 4.0.6 and 3.x up to and including 3.7.4 allows an authorized user to update the Recursor\u0027s ACL by adding and removing netmasks, and to configure forward zones. It was discovered that the new netmask and IP addresses of forwarded zones were not sufficiently validated, allowing an authenticated user to inject new configuration directives into the Recursor\u0027s configuration." }, { "lang": "es", "value": "Cuando a api-config-dir se le asigna un valor no vac\u00edo, lo que no ocurre por defecto, la API en PowerDNS Recursor 4.x hasta e incluyendo la versi\u00f3n 4.0.6 y en versiones 3.x hasta la 3.7.4, tambi\u00e9n incluida, permite que un usuario autorizado actualice la lista de control de acceso de Recursor a\u00f1adiendo y eliminando m\u00e1scaras de red y configure zonas de redirecci\u00f3n. Se ha descubierto que las nuevas m\u00e1scaras de red y las direcciones IP de las zonas redireccionadas no se validaban lo suficiente, lo que permite que un usuario autenticado inyecte nuevas directivas de configuraci\u00f3n en la configuraci\u00f3n de Recursor." } ], "id": "CVE-2017-15093", "lastModified": "2024-11-21T03:14:03.390", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "exploitabilityScore": 1.6, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-01-23T15:29:00.383", "references": [ { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/101982" }, { "source": "secalert@redhat.com", "tags": [ "Mitigation", "Patch", "Vendor Advisory" ], "url": "https://doc.powerdns.com/recursor/security-advisories/powerdns-advisory-2017-06.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/101982" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mitigation", "Patch", "Vendor Advisory" ], "url": "https://doc.powerdns.com/recursor/security-advisories/powerdns-advisory-2017-06.html" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "secalert@redhat.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
7.5 (High) - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Vendor | Product | Version | |
---|---|---|---|
powerdns | authoritative | * | |
powerdns | recursor | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:powerdns:authoritative:*:*:*:*:*:*:*:*", "matchCriteriaId": "CC6D884E-61CF-41C3-8020-ABCA01B97EF3", "versionEndIncluding": "4.1.4", "versionStartIncluding": "4.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:powerdns:recursor:*:*:*:*:*:*:*:*", "matchCriteriaId": "8E865DFB-08E7-4EBE-B8E0-955314EE532D", "versionEndIncluding": "4.1.4", "versionStartIncluding": "4.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "PowerDNS Authoritative Server 4.1.0 up to 4.1.4 inclusive and PowerDNS Recursor 4.0.0 up to 4.1.4 inclusive are vulnerable to a packet cache pollution via crafted query that can lead to denial of service." }, { "lang": "es", "value": "PowerDNS Authoritative Server desde la versi\u00f3n 4.1.0 hasta la 4.1.4 y PowerDNS Recursor desde la versi\u00f3n 4.0.0 hasta la 4.1.4, son vulnerables a una contaminaci\u00f3n de memora cach\u00e9 de paquetes mediante una consulta manipulada que puede provocar una denegaci\u00f3n de servicio (DoS)." } ], "id": "CVE-2018-14626", "lastModified": "2024-11-21T03:49:27.180", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "secalert@redhat.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-11-29T18:29:00.477", "references": [ { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14626" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "https://doc.powerdns.com/authoritative/security-advisories/powerdns-advisory-2018-05.html" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "https://doc.powerdns.com/recursor/security-advisories/powerdns-advisory-2018-06.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14626" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://doc.powerdns.com/authoritative/security-advisories/powerdns-advisory-2018-05.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://doc.powerdns.com/recursor/security-advisories/powerdns-advisory-2018-06.html" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-400" } ], "source": "secalert@redhat.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
5.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:powerdns:recursor:*:*:*:*:*:*:*:*", "matchCriteriaId": "5ADA5151-D48E-462A-B05B-74F93F7BC93A", "versionEndExcluding": "4.6.6", "vulnerable": true }, { "criteria": "cpe:2.3:a:powerdns:recursor:*:*:*:*:*:*:*:*", "matchCriteriaId": "515C04D7-C041-429A-BDDE-B27D9F49E57B", "versionEndExcluding": "4.7.5", "versionStartIncluding": "4.7.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:powerdns:recursor:*:*:*:*:*:*:*:*", "matchCriteriaId": "1B8A7A13-5283-42CA-A2A0-9B44BEBD81C0", "versionEndExcluding": "4.8.4", "versionStartIncluding": "4.8.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Denial of service vulnerability in PowerDNS Recursor allows authoritative servers to be marked unavailable.This issue affects Recursor: through 4.6.5, through 4.7.4 , through 4.8.3.\n\n" } ], "id": "CVE-2023-26437", "lastModified": "2024-11-21T07:51:26.787", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 3.4, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:N/A:L", "version": "3.1" }, "exploitabilityScore": 1.6, "impactScore": 1.4, "source": "security@open-xchange.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-04-04T15:15:08.880", "references": [ { "source": "security@open-xchange.com", "tags": [ "Vendor Advisory" ], "url": "https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2023-02.html" }, { "source": "security@open-xchange.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CN7VMRYKZHG2UDUAK326LXD3JY7NO3LR/" }, { "source": "security@open-xchange.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IHPD6SIQOG7245GXFQHPUEI4AZ6Y3KD6/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2023-02.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CN7VMRYKZHG2UDUAK326LXD3JY7NO3LR/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IHPD6SIQOG7245GXFQHPUEI4AZ6Y3KD6/" } ], "sourceIdentifier": "security@open-xchange.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:powerdns:recursor:4.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "62D7035F-C6B4-4122-9311-0FAF3193504F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper input validation bugs in DNSSEC validators components in PowerDNS version 4.1.0 allow attacker in man-in-the-middle position to deny existence of some data in DNS via packet replay." }, { "lang": "es", "value": "Errores de validaci\u00f3n indebida de entradas en los componentes de validadores DNSSEC en PowerDNS 4.1.0 permiten que un atacante Man-in-the-Middle (MitM) niegue la existencia de algunos datos en DNS mediante la reproducci\u00f3n de paquetes." } ], "id": "CVE-2018-1000003", "lastModified": "2024-11-21T03:39:23.940", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "exploitabilityScore": 2.2, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-01-22T18:29:00.290", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://doc.powerdns.com/recursor/security-advisories/powerdns-advisory-2018-01.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://doc.powerdns.com/recursor/security-advisories/powerdns-advisory-2018-01.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
powerdns | recursor | * | |
powerdns | recursor | 2.0_rc1 | |
powerdns | recursor | 2.8 | |
powerdns | recursor | 2.9.15 | |
powerdns | recursor | 2.9.16 | |
powerdns | recursor | 2.9.17 | |
powerdns | recursor | 2.9.18 | |
powerdns | recursor | 3.0 | |
powerdns | recursor | 3.0.1 | |
powerdns | recursor | 3.1 | |
powerdns | recursor | 3.1.1 | |
powerdns | recursor | 3.1.2 | |
powerdns | recursor | 3.1.3 | |
powerdns | recursor | 3.1.4 | |
powerdns | recursor | 3.1.5 | |
powerdns | recursor | 3.1.6 | |
powerdns | recursor | 3.1.7 | |
powerdns | recursor | 3.1.7.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:powerdns:recursor:*:*:*:*:*:*:*:*", "matchCriteriaId": "E8F4B452-AA57-4D2A-B757-7B4F7C712CB6", "versionEndIncluding": "3.1.7.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:powerdns:recursor:2.0_rc1:*:*:*:*:*:*:*", "matchCriteriaId": "E02559EA-6C7F-4328-A435-B4F69E640645", "vulnerable": true }, { "criteria": "cpe:2.3:a:powerdns:recursor:2.8:*:*:*:*:*:*:*", "matchCriteriaId": "D390616D-8CAB-46D3-864D-09AF99E3A407", "vulnerable": true }, { "criteria": "cpe:2.3:a:powerdns:recursor:2.9.15:*:*:*:*:*:*:*", "matchCriteriaId": "47DFAA6A-CA5B-4B2A-BFC2-A0DF85BF68D8", "vulnerable": true }, { "criteria": "cpe:2.3:a:powerdns:recursor:2.9.16:*:*:*:*:*:*:*", "matchCriteriaId": "306EBF4B-2292-4B14-9835-9FD0E82FE7CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:powerdns:recursor:2.9.17:*:*:*:*:*:*:*", "matchCriteriaId": "3A31C83E-8A81-4483-A245-FD1C08684183", "vulnerable": true }, { "criteria": "cpe:2.3:a:powerdns:recursor:2.9.18:*:*:*:*:*:*:*", "matchCriteriaId": "44D51FCC-8AD6-4461-8F48-B77EB2693C89", "vulnerable": true }, { "criteria": "cpe:2.3:a:powerdns:recursor:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "38DDFF27-8CBB-468D-9837-C74538E5EF0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:powerdns:recursor:3.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "B3920499-3580-4EA6-AD56-6515C3B8495A", "vulnerable": true }, { "criteria": "cpe:2.3:a:powerdns:recursor:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "AF444F17-46F1-4036-B5F1-CA04F7F19684", "vulnerable": true }, { "criteria": "cpe:2.3:a:powerdns:recursor:3.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "FA1E4934-6690-4A09-8E6E-FE7ED57B9DEE", "vulnerable": true }, { "criteria": "cpe:2.3:a:powerdns:recursor:3.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "D474CF9D-1898-46D3-80B1-2D3743265F56", "vulnerable": true }, { "criteria": "cpe:2.3:a:powerdns:recursor:3.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "E18F9C22-04BB-4081-89E0-E6989970EBCD", "vulnerable": true }, { "criteria": "cpe:2.3:a:powerdns:recursor:3.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "FD3E469E-EAE5-4BF1-BB69-6445FBBF96FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:powerdns:recursor:3.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "5333FFD9-9287-4DD8-BD23-5CA3F575313F", "vulnerable": true }, { "criteria": "cpe:2.3:a:powerdns:recursor:3.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "5EC1BD97-DB54-48D1-955E-9F935CDE07C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:powerdns:recursor:3.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "82DFE95C-19B3-4F48-AE74-3D884D86D0DE", "vulnerable": true }, { "criteria": "cpe:2.3:a:powerdns:recursor:3.1.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "45D27722-962A-4F0A-AEC0-CDC253F7F857", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer overflow in PowerDNS Recursor before 3.1.7.2 allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via crafted packets." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer en PowerDNS Recursor anterior a v3.1.7.2 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda del demonio) o posiblemente ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de paquetes manipulados." } ], "id": "CVE-2009-4009", "lastModified": "2024-11-21T01:08:43.563", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2010-01-08T17:30:02.207", "references": [ { "source": "cve@mitre.org", "url": "http://doc.powerdns.com/powerdns-advisory-2010-01.html" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/38004" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/38068" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1023403" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/508743/100/0/threaded" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/37650" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/0054" }, { "source": "cve@mitre.org", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=552285" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/55438" }, { "source": "cve@mitre.org", "url": "https://www.redhat.com/archives/fedora-package-announce/2010-January/msg00217.html" }, { "source": "cve@mitre.org", "url": "https://www.redhat.com/archives/fedora-package-announce/2010-January/msg00228.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://doc.powerdns.com/powerdns-advisory-2010-01.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/38004" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/38068" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1023403" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/508743/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/37650" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/0054" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=552285" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/55438" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.redhat.com/archives/fedora-package-announce/2010-January/msg00217.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.redhat.com/archives/fedora-package-announce/2010-January/msg00228.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:powerdns:recursor:*:*:*:*:*:*:*:*", "matchCriteriaId": "AA8CA6BA-8533-47D2-99AE-F8AFDEF78A33", "versionEndIncluding": "3.1.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:powerdns:recursor:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "38DDFF27-8CBB-468D-9837-C74538E5EF0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:powerdns:recursor:3.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "B3920499-3580-4EA6-AD56-6515C3B8495A", "vulnerable": true }, { "criteria": "cpe:2.3:a:powerdns:recursor:3.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "FA1E4934-6690-4A09-8E6E-FE7ED57B9DEE", "vulnerable": true }, { "criteria": "cpe:2.3:a:powerdns:recursor:3.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "D474CF9D-1898-46D3-80B1-2D3743265F56", "vulnerable": true }, { "criteria": "cpe:2.3:a:powerdns:recursor:3.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "E18F9C22-04BB-4081-89E0-E6989970EBCD", "vulnerable": true }, { "criteria": "cpe:2.3:a:powerdns:recursor:3.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "FD3E469E-EAE5-4BF1-BB69-6445FBBF96FF", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "PowerDNS Recursor before 3.1.6 does not always use the strongest random number generator for source port selection, which makes it easier for remote attack vectors to conduct DNS cache poisoning. NOTE: this is related to incomplete integration of security improvements associated with addressing CVE-2008-1637." }, { "lang": "es", "value": "PowerDNS Recursor anterior a 3.1.6 no utiliza siempre el generador de n\u00fameros aleatorios m\u00e1s robusto para la selecci\u00f3n de un puerto de origen, lo que le hace m\u00e1s f\u00e1cil para los vectores de ataque remotos para llevar a cabo un ataque por envenenamiento de cach\u00e9 DNS. NOTA: Esto est\u00e1 relacionado con la incompleta integraci\u00f3n de las mejoras de la seguridad asociados con CVE-2008-1637." } ], "id": "CVE-2008-3217", "lastModified": "2024-11-21T00:48:43.593", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2008-07-18T16:41:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://doc.powerdns.com/changelog.html#CHANGELOG-RECURSOR-3-1-6" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/31311" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://wiki.powerdns.com/cgi-bin/trac.fcgi/changeset/1179" }, { "source": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2008/07/09/10" }, { "source": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2008/07/10/6" }, { "source": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2008/07/16/12" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/30782" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43925" }, { "source": "cve@mitre.org", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg01353.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://doc.powerdns.com/changelog.html#CHANGELOG-RECURSOR-3-1-6" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/31311" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://wiki.powerdns.com/cgi-bin/trac.fcgi/changeset/1179" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2008/07/09/10" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2008/07/10/6" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2008/07/16/12" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/30782" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43925" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg01353.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-189" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:powerdns:recursor:*:*:*:*:*:*:*:*", "matchCriteriaId": "8ACF33C1-AF43-4F5B-B18A-D5D5B9E2573E", "versionEndExcluding": "4.5.10", "versionStartIncluding": "4.5.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:powerdns:recursor:*:*:*:*:*:*:*:*", "matchCriteriaId": "311028C3-FA63-4026-A7DE-E7FEB8706906", "versionEndExcluding": "4.6.3", "versionStartIncluding": "4.6.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:powerdns:recursor:*:*:*:*:*:*:*:*", "matchCriteriaId": "D6CA6CBA-F70B-4833-B2C4-B1C3A79A686A", "versionEndExcluding": "4.7.2", "versionStartIncluding": "4.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*", "matchCriteriaId": "5C675112-476C-4D7C-BCB9-A2FB2D0BC9FD", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "PowerDNS Recursor up to and including 4.5.9, 4.6.2 and 4.7.1, when protobuf logging is enabled, has Improper Cleanup upon a Thrown Exception, leading to a denial of service (daemon crash) via a DNS query that leads to an answer with specific properties." }, { "lang": "es", "value": "PowerDNS Recursor versiones hasta 4.5.9, 4.6.2 y 4.7.1 incluy\u00e9ndola, cuando el registro de protobufs est\u00e1 habilitado, presenta una limpieza inapropiada tras una excepci\u00f3n lanzada, conllevando a una denegaci\u00f3n de servicio (bloqueo del demonio) por medio de una consulta DNS que conlleva a una respuesta con propiedades espec\u00edficas." } ], "id": "CVE-2022-37428", "lastModified": "2024-11-21T07:14:58.440", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "cve@mitre.org", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-08-23T17:15:15.170", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://docs.powerdns.com/recursor/lua-config/protobuf.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2022-02.html" }, { "source": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FXSREJKTT6RNE3GXQENQ4R4HS37UNSPX/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://docs.powerdns.com/recursor/lua-config/protobuf.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2022-02.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FXSREJKTT6RNE3GXQENQ4R4HS37UNSPX/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-459" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
7.5 (High) - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Vendor | Product | Version | |
---|---|---|---|
powerdns | recursor | * | |
debian | debian_linux | 8.0 | |
debian | debian_linux | 9.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:powerdns:recursor:*:*:*:*:*:*:*:*", "matchCriteriaId": "0C5D2712-9696-4D7C-998A-0726D88EDBAB", "versionEndExcluding": "4.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue has been found in the parsing of authoritative answers in PowerDNS Recursor before 4.0.8, leading to a NULL pointer dereference when parsing a specially crafted answer containing a CNAME of a different class than IN. An unauthenticated remote attacker could cause a denial of service." }, { "lang": "es", "value": "Se ha encontrado un problema en el an\u00e1lisis de respuestas autorizadas en PowerDNS Recursor en versiones anteriores a la 4.0.8, lo que conduce a una desreferencia de puntero NULL al analizar una respuesta especialmente manipulada que contiene un CNAME de una clase diferente a IN. Un atacante remoto no autenticado podr\u00eda provocar una denegaci\u00f3n de servicio (DoS)." } ], "id": "CVE-2017-15120", "lastModified": "2024-11-21T03:14:06.713", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "secalert@redhat.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-07-27T15:29:00.343", "references": [ { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Patch", "Third Party Advisory" ], "url": "http://seclists.org/oss-sec/2017/q4/382" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/106335" }, { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-15120" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://doc.powerdns.com/recursor/security-advisories/powerdns-advisory-2017-08.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2017/dsa-4063" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Patch", "Third Party Advisory" ], "url": "http://seclists.org/oss-sec/2017/q4/382" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/106335" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-15120" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://doc.powerdns.com/recursor/security-advisories/powerdns-advisory-2017-08.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2017/dsa-4063" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-476" } ], "source": "secalert@redhat.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-476" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
5.9 (Medium) - CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
▼ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-7074 | Issue Tracking, Third Party Advisory | |
secalert@redhat.com | https://doc.powerdns.com/md/security/powerdns-advisory-2016-04/ | Vendor Advisory | |
secalert@redhat.com | https://www.debian.org/security/2017/dsa-3764 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-7074 | Issue Tracking, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://doc.powerdns.com/md/security/powerdns-advisory-2016-04/ | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.debian.org/security/2017/dsa-3764 | Third Party Advisory |
Vendor | Product | Version | |
---|---|---|---|
powerdns | authoritative | * | |
powerdns | authoritative | * | |
powerdns | recursor | * | |
debian | debian_linux | 8.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:powerdns:authoritative:*:*:*:*:*:*:*:*", "matchCriteriaId": "45749DBA-3089-4FD6-8999-9A6F0C3B4904", "versionEndExcluding": "3.4.11", "vulnerable": true }, { "criteria": "cpe:2.3:a:powerdns:authoritative:*:*:*:*:*:*:*:*", "matchCriteriaId": "1DDAEFF5-B01E-4765-98F8-F00F80806118", "versionEndExcluding": "4.0.2", "versionStartIncluding": "4.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:powerdns:recursor:*:*:*:*:*:*:*:*", "matchCriteriaId": "0DBCA6C5-AC57-401A-8B44-A9AAEFB92B60", "versionEndExcluding": "4.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue has been found in PowerDNS before 3.4.11 and 4.0.2, and PowerDNS recursor before 4.0.4, allowing an attacker in position of man-in-the-middle to alter the content of an AXFR because of insufficient validation of TSIG signatures. A missing check that the TSIG record is the last one, leading to the possibility of parsing records that are not covered by the TSIG signature." }, { "lang": "es", "value": "Se ha descubierto un problema en PowerDNS en versiones anteriores a la 3.4.11 y 4.0.2, y PowerDNS recursor en versiones anteriores a la 4.0.4, lo que permite que un atacante en posici\u00f3n Man-in-the-Middle (MitM) altere el contenido de un AXFR debido a una validaci\u00f3n insuficiente de firmas TSIG. Falta una comprobaci\u00f3n de que el registro TSIG es el \u00faltimo, lo que conduce a la posibilidad de que se analicen registros que no est\u00e1n cubiertos por la firma TSIG." } ], "id": "CVE-2016-7074", "lastModified": "2024-11-21T02:57:24.437", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "secalert@redhat.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "exploitabilityScore": 2.2, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-09-11T13:29:01.167", "references": [ { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-7074" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "https://doc.powerdns.com/md/security/powerdns-advisory-2016-04/" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2017/dsa-3764" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-7074" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://doc.powerdns.com/md/security/powerdns-advisory-2016-04/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2017/dsa-3764" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "secalert@redhat.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
powerdns | recursor | * | |
fedoraproject | fedora | 31 | |
fedoraproject | fedora | 32 | |
debian | debian_linux | 10.0 | |
opensuse | backports_sle | 15.0 | |
opensuse | leap | 15.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:powerdns:recursor:*:*:*:*:*:*:*:*", "matchCriteriaId": "9CF23533-E208-46EA-AD26-311F66A62358", "versionEndIncluding": "4.3.0", "versionStartIncluding": "4.1.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*", "matchCriteriaId": "80F0FA5D-8D3B-4C0E-81E2-87998286AF33", "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*", "matchCriteriaId": "36D96259-24BD-44E2-96D9-78CE1D41F956", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:opensuse:backports_sle:15.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "40513095-7E6E-46B3-B604-C926F1BA3568", "vulnerable": true }, { "criteria": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", "matchCriteriaId": "B620311B-34A3-48A6-82DF-6F078D7A4493", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "PowerDNS Recursor from 4.1.0 up to and including 4.3.0 does not sufficiently defend against amplification attacks. An issue in the DNS protocol has been found that allow malicious parties to use recursive DNS services to attack third party authoritative name servers. The attack uses a crafted reply by an authoritative name server to amplify the resulting traffic between the recursive and other authoritative name servers. Both types of service can suffer degraded performance as an effect. This is triggered by random subdomains in the NSDNAME in NS records. PowerDNS Recursor 4.1.16, 4.2.2 and 4.3.1 contain a mitigation to limit the impact of this DNS protocol issue." }, { "lang": "es", "value": "PowerDNS Recursor versiones desde 4.1.0 hasta 4.3.0 e incluy\u00e9ndola, no defiende suficientemente contra los ataques de amplificaci\u00f3n. Ha sido encontrado un problema en el protocolo DNS que permite a las partes maliciosas usar servicios DNS recursivos para atacar servidores de nombres autorizados por terceros. El ataque usa una respuesta dise\u00f1ada por un servidor de nombres autorizados para amplificar el tr\u00e1fico resultante entre los servidores de nombres recursivos y otros. Ambos tipos de servicio pueden sufrir un rendimiento degradado como un efecto. Esto es activado por subdominios aleatorios en NSDNAME en registros NS. PowerDNS Recursor versiones 4.1.16, 4.2.2 y 4.3.1, contienen una mitigaci\u00f3n para limitar el impacto de este problema del protocolo DNS." } ], "id": "CVE-2020-10995", "lastModified": "2024-11-21T04:56:32.650", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-05-19T17:15:10.163", "references": [ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00052.html" }, { "source": "cve@mitre.org", "tags": [ "Technical Description", "Third Party Advisory" ], "url": "http://www.nxnsattack.com" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://doc.powerdns.com/recursor/security-advisories/powerdns-advisory-2020-01.html" }, { "source": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NMP72NJGKBWR5WEBXAWX5KSLQUDFTG6S/" }, { "source": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PS4ZN5XGENYNFKX7QIIOUCQQHXE37GJF/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2020/dsa-4691" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00052.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Technical Description", "Third Party Advisory" ], "url": "http://www.nxnsattack.com" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://doc.powerdns.com/recursor/security-advisories/powerdns-advisory-2020-01.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NMP72NJGKBWR5WEBXAWX5KSLQUDFTG6S/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PS4ZN5XGENYNFKX7QIIOUCQQHXE37GJF/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2020/dsa-4691" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-400" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
powerdns | recursor | * | |
fedoraproject | fedora | 31 | |
fedoraproject | fedora | 32 | |
debian | debian_linux | 10.0 | |
opensuse | backports_sle | 15.0 | |
opensuse | leap | 15.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:powerdns:recursor:*:*:*:*:*:*:*:*", "matchCriteriaId": "9CF23533-E208-46EA-AD26-311F66A62358", "versionEndIncluding": "4.3.0", "versionStartIncluding": "4.1.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*", "matchCriteriaId": "80F0FA5D-8D3B-4C0E-81E2-87998286AF33", "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*", "matchCriteriaId": "36D96259-24BD-44E2-96D9-78CE1D41F956", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:opensuse:backports_sle:15.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "40513095-7E6E-46B3-B604-C926F1BA3568", "vulnerable": true }, { "criteria": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", "matchCriteriaId": "B620311B-34A3-48A6-82DF-6F078D7A4493", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue has been found in PowerDNS Recursor 4.1.0 through 4.3.0 where records in the answer section of a NXDOMAIN response lacking an SOA were not properly validated in SyncRes::processAnswer, allowing an attacker to bypass DNSSEC validation." }, { "lang": "es", "value": "Se detect\u00f3 un problema en PowerDNS Recursor versiones 4.1.0 hasta 4.3.0, donde los registros en la secci\u00f3n de respuestas de una respuesta NXDOMAIN que carece de SOA no fueron comprobados apropiadamente en las funci\u00f3n SyncRes::processAnswer, permitiendo a un atacante omitir la comprobaci\u00f3n DNSSEC." } ], "id": "CVE-2020-12244", "lastModified": "2024-11-21T04:59:22.253", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-05-19T14:15:11.097", "references": [ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00052.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2020/05/19/3" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://doc.powerdns.com/recursor/security-advisories/powerdns-advisory-2020-02.html" }, { "source": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NMP72NJGKBWR5WEBXAWX5KSLQUDFTG6S/" }, { "source": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PS4ZN5XGENYNFKX7QIIOUCQQHXE37GJF/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2020/dsa-4691" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00052.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2020/05/19/3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://doc.powerdns.com/recursor/security-advisories/powerdns-advisory-2020-02.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NMP72NJGKBWR5WEBXAWX5KSLQUDFTG6S/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PS4ZN5XGENYNFKX7QIIOUCQQHXE37GJF/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2020/dsa-4691" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-347" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
redhat | enterprise_linux | 6.0 | |
redhat | enterprise_linux | 7.0 | |
redhat | enterprise_linux | 8.0 | |
redhat | enterprise_linux | 9.0 | |
microsoft | windows_server_2008 | r2 | |
microsoft | windows_server_2012 | - | |
microsoft | windows_server_2012 | r2 | |
microsoft | windows_server_2016 | - | |
microsoft | windows_server_2019 | - | |
microsoft | windows_server_2022 | - | |
microsoft | windows_server_2022_23h2 | - | |
fedoraproject | fedora | 39 | |
thekelleys | dnsmasq | * | |
nic | knot_resolver | * | |
powerdns | recursor | * | |
powerdns | recursor | * | |
powerdns | recursor | * | |
isc | bind | * | |
isc | bind | * | |
isc | bind | * | |
nlnetlabs | unbound | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "2F6AB192-9D7D-4A9A-8995-E53A9DE9EAFC", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "142AD0DD-4CF3-4D74-9442-459CE3347E3A", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "F4CFF558-3C47-480D-A2F0-BABF26042943", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "7F6FB57C-2BC7-487C-96DD-132683AEB35D", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*", "matchCriteriaId": "821614DD-37DD-44E2-A8A4-FE8D23A33C3C", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:-:*:*:*:*:*:*:*", "matchCriteriaId": "75CCACE6-A0EE-4A6F-BD5A-7AA504B02717", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*", "matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:thekelleys:dnsmasq:*:*:*:*:*:*:*:*", "matchCriteriaId": "964796B3-BA45-4180-A8DA-64CF93CED122", "versionEndExcluding": "2.90", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:nic:knot_resolver:*:*:*:*:*:*:*:*", "matchCriteriaId": "8A8328E8-C652-4262-8C00-D89AD8F75CCF", "versionEndExcluding": "5.71", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:powerdns:recursor:*:*:*:*:*:*:*:*", "matchCriteriaId": "5207D316-7DC9-4724-BC48-C8D3EC5087E8", "versionEndExcluding": "4.8.6", "versionStartIncluding": "4.8.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:powerdns:recursor:*:*:*:*:*:*:*:*", "matchCriteriaId": "FEE64451-7CB9-45BD-8168-9F48199A9363", "versionEndExcluding": "4.9.3", "versionStartIncluding": "4.9.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:powerdns:recursor:*:*:*:*:*:*:*:*", "matchCriteriaId": "0526B76D-52BB-4FA1-B692-8EDEC673EAE5", "versionEndExcluding": "5.0.2", "versionStartIncluding": "5.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:isc:bind:*:*:*:*:-:*:*:*", "matchCriteriaId": "F3814976-5223-4615-BA7B-E33083D3EC26", "versionEndIncluding": "9.16.46", "versionStartIncluding": "9.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:isc:bind:*:*:*:*:-:*:*:*", "matchCriteriaId": "140CCABA-F134-4CC2-9960-258D6BFF34DD", "versionEndIncluding": "9.18.22", "versionStartIncluding": "9.18.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:isc:bind:*:*:*:*:-:*:*:*", "matchCriteriaId": "71BAD5BF-8532-4988-A772-6CD7B851E9E2", "versionEndIncluding": "9.19.20", "versionStartIncluding": "9.19.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:nlnetlabs:unbound:*:*:*:*:*:*:*:*", "matchCriteriaId": "8C094EEB-BAD6-495B-B1CB-671D31549F15", "versionEndExcluding": "1.19.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Certain DNSSEC aspects of the DNS protocol (in RFC 4033, 4034, 4035, 6840, and related RFCs) allow remote attackers to cause a denial of service (CPU consumption) via one or more DNSSEC responses, aka the \"KeyTrap\" issue. One of the concerns is that, when there is a zone with many DNSKEY and RRSIG records, the protocol specification implies that an algorithm must evaluate all combinations of DNSKEY and RRSIG records." }, { "lang": "es", "value": "Ciertos aspectos DNSSEC del protocolo DNS (en RFC 4035 y RFC relacionados) permiten a atacantes remotos provocar una denegaci\u00f3n de servicio (consumo de CPU) a trav\u00e9s de una o m\u00e1s respuestas DNSSEC cuando hay una zona con muchos registros DNSKEY y RRSIG, tambi\u00e9n conocido como \"KeyTrap\". \" asunto. La especificaci\u00f3n del protocolo implica que un algoritmo debe evaluar todas las combinaciones de registros DNSKEY y RRSIG." } ], "id": "CVE-2023-50387", "lastModified": "2024-11-21T08:36:56.937", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-02-14T16:15:45.300", "references": [ { "source": "cve@mitre.org", "tags": [ "Mailing List" ], "url": "http://www.openwall.com/lists/oss-security/2024/02/16/2" }, { "source": "cve@mitre.org", "tags": [ "Mailing List" ], "url": "http://www.openwall.com/lists/oss-security/2024/02/16/3" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/security/cve/CVE-2023-50387" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking" ], "url": "https://bugzilla.suse.com/show_bug.cgi?id=1219823" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2024-01.html" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://gitlab.nic.cz/knot/knot-resolver/-/releases/v5.7.1" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://kb.isc.org/docs/cve-2023-50387" }, { "source": "cve@mitre.org", "url": "https://lists.debian.org/debian-lts-announce/2024/02/msg00006.html" }, { "source": "cve@mitre.org", "url": "https://lists.debian.org/debian-lts-announce/2024/05/msg00011.html" }, { "source": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6FV5O347JTX7P5OZA6NGO4MKTXRXMKOZ/" }, { "source": "cve@mitre.org", "tags": [ "Mailing List" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BUIP7T7Z4T3UHLXFWG6XIVDP4GYPD3AI/" }, { "source": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HVRDSJVZKMCXKKPP6PNR62T7RWZ3YSDZ/" }, { "source": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IGSLGKUAQTW5JPPZCMF5YPEYALLRUZZ6/" }, { "source": "cve@mitre.org", "tags": [ "Mailing List" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PNNHZSZPG2E7NBMBNYPGHCFI4V4XRWNQ/" }, { "source": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RGS7JN6FZXUSTC2XKQHH27574XOULYYJ/" }, { "source": "cve@mitre.org", "tags": [ "Mailing List" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SVYA42BLXUCIDLD35YIJPJSHDIADNYMP/" }, { "source": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TEXGOYGW7DBS3N2QSSQONZ4ENIRQEAPG/" }, { "source": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UQESRWMJCF4JEYJEAKLRM6CT55GLJAB7/" }, { "source": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZDZFMEKQTZ4L7RY46FCENWFB5MDT263R/" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2024q1/017430.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-50387" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://news.ycombinator.com/item?id=39367411" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking" ], "url": "https://news.ycombinator.com/item?id=39372384" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://nlnetlabs.nl/news/2024/Feb/13/unbound-1.19.1-released/" }, { "source": "cve@mitre.org", "url": "https://security.netapp.com/advisory/ntap-20240307-0007/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.athene-center.de/aktuelles/key-trap" }, { "source": "cve@mitre.org", "tags": [ "Technical Description", "Third Party Advisory" ], "url": "https://www.athene-center.de/fileadmin/content/PDF/Technical_Report_KeyTrap.pdf" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.isc.org/blogs/2024-bind-security-release/" }, { "source": "cve@mitre.org", "tags": [ "Press/Media Coverage", "Third Party Advisory" ], "url": "https://www.securityweek.com/keytrap-dns-attack-could-disable-large-parts-of-internet-researchers/" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.theregister.com/2024/02/13/dnssec_vulnerability_internet/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List" ], "url": "http://www.openwall.com/lists/oss-security/2024/02/16/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List" ], "url": "http://www.openwall.com/lists/oss-security/2024/02/16/3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/security/cve/CVE-2023-50387" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking" ], "url": "https://bugzilla.suse.com/show_bug.cgi?id=1219823" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2024-01.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://gitlab.nic.cz/knot/knot-resolver/-/releases/v5.7.1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://kb.isc.org/docs/cve-2023-50387" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.debian.org/debian-lts-announce/2024/02/msg00006.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.debian.org/debian-lts-announce/2024/05/msg00011.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6FV5O347JTX7P5OZA6NGO4MKTXRXMKOZ/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BUIP7T7Z4T3UHLXFWG6XIVDP4GYPD3AI/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HVRDSJVZKMCXKKPP6PNR62T7RWZ3YSDZ/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IGSLGKUAQTW5JPPZCMF5YPEYALLRUZZ6/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PNNHZSZPG2E7NBMBNYPGHCFI4V4XRWNQ/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RGS7JN6FZXUSTC2XKQHH27574XOULYYJ/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SVYA42BLXUCIDLD35YIJPJSHDIADNYMP/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TEXGOYGW7DBS3N2QSSQONZ4ENIRQEAPG/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UQESRWMJCF4JEYJEAKLRM6CT55GLJAB7/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZDZFMEKQTZ4L7RY46FCENWFB5MDT263R/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2024q1/017430.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-50387" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://news.ycombinator.com/item?id=39367411" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking" ], "url": "https://news.ycombinator.com/item?id=39372384" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://nlnetlabs.nl/news/2024/Feb/13/unbound-1.19.1-released/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.netapp.com/advisory/ntap-20240307-0007/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.athene-center.de/aktuelles/key-trap" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Technical Description", "Third Party Advisory" ], "url": "https://www.athene-center.de/fileadmin/content/PDF/Technical_Report_KeyTrap.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.isc.org/blogs/2024-bind-security-release/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Press/Media Coverage", "Third Party Advisory" ], "url": "https://www.securityweek.com/keytrap-dns-attack-could-disable-large-parts-of-internet-researchers/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.theregister.com/2024/02/13/dnssec_vulnerability_internet/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-770" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:powerdns:recursor:*:*:*:*:*:*:*:*", "matchCriteriaId": "13999342-7F2E-4CAC-B313-4FBEBDB8EFD2", "versionEndIncluding": "4.1.16", "vulnerable": true }, { "criteria": "cpe:2.3:a:powerdns:recursor:*:*:*:*:*:*:*:*", "matchCriteriaId": "F47A56D3-91C7-4328-B948-24AC21C31454", "versionEndIncluding": "4.2.2", "versionStartIncluding": "4.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:powerdns:recursor:*:*:*:*:*:*:*:*", "matchCriteriaId": "332C009D-A5E5-437B-B143-53976BEA6984", "versionEndIncluding": "4.3.1", "versionStartIncluding": "4.3.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In PowerDNS Recursor versions up to and including 4.3.1, 4.2.2 and 4.1.16, the ACL restricting access to the internal web server is not properly enforced." }, { "lang": "es", "value": "En PowerDNS Recursor versiones hasta 4.3.1, 4.2.2 y 4.1.16 incluy\u00e9ndola, la ACL que restringe el acceso al servidor web interno no se aplica correctamente" } ], "id": "CVE-2020-14196", "lastModified": "2024-11-21T05:02:50.930", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-07-01T18:15:10.980", "references": [ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00043.html" }, { "source": "cve@mitre.org", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00042.html" }, { "source": "cve@mitre.org", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00044.html" }, { "source": "cve@mitre.org", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00036.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://doc.powerdns.com/recursor/security-advisories/powerdns-advisory-2020-04.html" }, { "source": "cve@mitre.org", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7TUNCUZNASYSTVD35QGFAI6XO2BFMQ2F/" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Release Notes", "Third Party Advisory" ], "url": "https://www.openwall.com/lists/oss-security/2020/07/01/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00043.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00042.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00044.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00036.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://doc.powerdns.com/recursor/security-advisories/powerdns-advisory-2020-04.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7TUNCUZNASYSTVD35QGFAI6XO2BFMQ2F/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Release Notes", "Third Party Advisory" ], "url": "https://www.openwall.com/lists/oss-security/2020/07/01/1" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-863" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:powerdns:recursor:*:*:*:*:*:*:*:*", "matchCriteriaId": "BFBA9267-A53C-4D1E-95BE-B69BA5C03DF3", "versionEndIncluding": "3.1.4", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "PowerDNS Recursor before 3.1.5 uses insufficient randomness to calculate (1) TRXID values and (2) UDP source port numbers, which makes it easier for remote attackers to poison a DNS cache, related to (a) algorithmic deficiencies in rand and random functions in external libraries, (b) use of a 32-bit seed value, and (c) choice of the time of day as the sole seeding information." }, { "lang": "es", "value": "PowerDNS Recursor anterior a 3.1.5 no emplea la suficiente aleatoriedad para calcular (1) los valores TRXID y (2) n\u00fameros de las fuentes de los puertos UDP; esto hace que sea m\u00e1s f\u00e1cil a los atacantes remotos envenenar una cach\u00e9 de DNS relacionada con (a) deficiencias algor\u00edtmicas en las funciones rand y random de librerias externas, (b) uso de una semilla de 32-bit, y (3) elecci\u00f3n del momento del d\u00eda como la \u00fanica semilla de informaci\u00f3n." } ], "id": "CVE-2008-1637", "lastModified": "2024-11-21T00:44:58.670", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2008-04-02T17:44:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://doc.powerdns.com/changelog.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch" ], "url": "http://doc.powerdns.com/powerdns-advisory-2008-01.html" }, { "source": "cve@mitre.org", "url": "http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00001.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Vendor Advisory" ], "url": "http://secunia.com/advisories/29584" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/29737" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/29764" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/29830" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/30581" }, { "source": "cve@mitre.org", "url": "http://security.gentoo.org/glsa/glsa-200804-22.xml" }, { "source": "cve@mitre.org", "url": "http://www.debian.org/security/2008/dsa-1544" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/490330/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/28517" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.trusteer.com/docs/PowerDNS_recursor_DNS_Cache_Poisoning.pdf" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.trusteer.com/docs/powerdnsrecursor.html" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2008/1046/references" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41534" }, { "source": "cve@mitre.org", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00198.html" }, { "source": "cve@mitre.org", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00224.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://doc.powerdns.com/changelog.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch" ], "url": "http://doc.powerdns.com/powerdns-advisory-2008-01.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00001.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Vendor Advisory" ], "url": "http://secunia.com/advisories/29584" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/29737" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/29764" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/29830" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/30581" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-200804-22.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2008/dsa-1544" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/490330/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/28517" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.trusteer.com/docs/PowerDNS_recursor_DNS_Cache_Poisoning.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.trusteer.com/docs/powerdnsrecursor.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2008/1046/references" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41534" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00198.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00224.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-189" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
7.5 (High) - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
▼ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-7068 | Issue Tracking, Third Party Advisory | |
secalert@redhat.com | https://doc.powerdns.com/md/security/powerdns-advisory-2016-02/ | Vendor Advisory | |
secalert@redhat.com | https://www.debian.org/security/2017/dsa-3763 | Third Party Advisory | |
secalert@redhat.com | https://www.debian.org/security/2017/dsa-3764 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-7068 | Issue Tracking, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://doc.powerdns.com/md/security/powerdns-advisory-2016-02/ | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.debian.org/security/2017/dsa-3763 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.debian.org/security/2017/dsa-3764 | Third Party Advisory |
Vendor | Product | Version | |
---|---|---|---|
powerdns | authoritative | * | |
powerdns | authoritative | * | |
powerdns | recursor | * | |
powerdns | recursor | * | |
debian | debian_linux | 8.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:powerdns:authoritative:*:*:*:*:*:*:*:*", "matchCriteriaId": "45749DBA-3089-4FD6-8999-9A6F0C3B4904", "versionEndExcluding": "3.4.11", "vulnerable": true }, { "criteria": "cpe:2.3:a:powerdns:authoritative:*:*:*:*:*:*:*:*", "matchCriteriaId": "1DDAEFF5-B01E-4765-98F8-F00F80806118", "versionEndExcluding": "4.0.2", "versionStartIncluding": "4.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:powerdns:recursor:*:*:*:*:*:*:*:*", "matchCriteriaId": "0A95C8FD-FB1C-4AFF-84E8-B8BFAF678F31", "versionEndExcluding": "3.7.4", "vulnerable": true }, { "criteria": "cpe:2.3:a:powerdns:recursor:*:*:*:*:*:*:*:*", "matchCriteriaId": "F07E82C1-0CEF-405D-8BE7-6918C64BABB2", "versionEndExcluding": "4.0.4", "versionStartIncluding": "4.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue has been found in PowerDNS before 3.4.11 and 4.0.2, and PowerDNS recursor before 3.7.4 and 4.0.4, allowing a remote, unauthenticated attacker to cause an abnormal CPU usage load on the PowerDNS server by sending crafted DNS queries, which might result in a partial denial of service if the system becomes overloaded. This issue is based on the fact that the PowerDNS server parses all records present in a query regardless of whether they are needed or even legitimate. A specially crafted query containing a large number of records can be used to take advantage of that behaviour." }, { "lang": "es", "value": "Se ha descubierto un problema en PowerDNS en versiones anteriores a la 3.4.11 y 4.0.2, y PowerDNS recursor en versiones anteriores a la 3.7.4 y 4.0.4, que permite que un atacante no autenticado remoto provoque una carga de uso de CPU anormal en el servidor de PowerDNS mediante el env\u00edo de consultas DNS manipuladas, lo que podr\u00eda resultar en una denegaci\u00f3n de servicio (DoS) parcial si el sistema se sobrecarga. Este problema se basa en el hecho de que el servidor de PowerDNS analiza todos los registros presentes en una consulta, independientemente de si se necesitan o incluso si son leg\u00edtimos. Una consulta especialmente manipulada que contiene un gran n\u00famero de registros puede emplearse para aprovecharse de este comportamiento." } ], "id": "CVE-2016-7068", "lastModified": "2024-11-21T02:57:23.717", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "secalert@redhat.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-09-11T13:29:00.713", "references": [ { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-7068" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "https://doc.powerdns.com/md/security/powerdns-advisory-2016-02/" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2017/dsa-3763" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2017/dsa-3764" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-7068" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://doc.powerdns.com/md/security/powerdns-advisory-2016-02/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2017/dsa-3763" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2017/dsa-3764" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "secalert@redhat.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-400" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
5.9 (Medium) - CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
▼ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-7073 | Issue Tracking, Third Party Advisory | |
secalert@redhat.com | https://doc.powerdns.com/md/security/powerdns-advisory-2016-04/ | Vendor Advisory | |
secalert@redhat.com | https://www.debian.org/security/2017/dsa-3764 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-7073 | Issue Tracking, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://doc.powerdns.com/md/security/powerdns-advisory-2016-04/ | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.debian.org/security/2017/dsa-3764 | Third Party Advisory |
Vendor | Product | Version | |
---|---|---|---|
powerdns | authoritative | * | |
powerdns | authoritative | * | |
powerdns | recursor | * | |
powerdns | recursor | * | |
debian | debian_linux | 8.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:powerdns:authoritative:*:*:*:*:*:*:*:*", "matchCriteriaId": "45749DBA-3089-4FD6-8999-9A6F0C3B4904", "versionEndExcluding": "3.4.11", "vulnerable": true }, { "criteria": "cpe:2.3:a:powerdns:authoritative:*:*:*:*:*:*:*:*", "matchCriteriaId": "1DDAEFF5-B01E-4765-98F8-F00F80806118", "versionEndExcluding": "4.0.2", "versionStartIncluding": "4.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:powerdns:recursor:*:*:*:*:*:*:*:*", "matchCriteriaId": "0A95C8FD-FB1C-4AFF-84E8-B8BFAF678F31", "versionEndExcluding": "3.7.4", "vulnerable": true }, { "criteria": "cpe:2.3:a:powerdns:recursor:*:*:*:*:*:*:*:*", "matchCriteriaId": "F07E82C1-0CEF-405D-8BE7-6918C64BABB2", "versionEndExcluding": "4.0.4", "versionStartIncluding": "4.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue has been found in PowerDNS before 3.4.11 and 4.0.2, and PowerDNS recursor before 4.0.4, allowing an attacker in position of man-in-the-middle to alter the content of an AXFR because of insufficient validation of TSIG signatures. A missing check of the TSIG time and fudge values was found in AXFRRetriever, leading to a possible replay attack." }, { "lang": "es", "value": "Se ha descubierto un problema en PowerDNS en versiones anteriores a la 3.4.11 y 4.0.2, y PowerDNS recursor en versiones anteriores a la 4.0.4, lo que permite que un atacante en posici\u00f3n Man-in-the-Middle (MitM) altere el contenido de un AXFR debido a una validaci\u00f3n insuficiente de firmas TSIG. La falta de una comprobaci\u00f3n de los valores time y fudge de TSIG se encontr\u00f3 en AXFRRetriever, lo que podr\u00eda conducir a un ataque de reproducci\u00f3n." } ], "id": "CVE-2016-7073", "lastModified": "2024-11-21T02:57:24.317", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "secalert@redhat.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "exploitabilityScore": 2.2, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-09-11T13:29:01.057", "references": [ { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-7073" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "https://doc.powerdns.com/md/security/powerdns-advisory-2016-04/" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2017/dsa-3764" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-7073" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://doc.powerdns.com/md/security/powerdns-advisory-2016-04/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2017/dsa-3764" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "secalert@redhat.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
5.9 (Medium) - CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
▼ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14644 | Issue Tracking, Third Party Advisory | |
secalert@redhat.com | https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2018-07.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14644 | Issue Tracking, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2018-07.html | Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:powerdns:recursor:*:*:*:*:*:*:*:*", "matchCriteriaId": "8E865DFB-08E7-4EBE-B8E0-955314EE532D", "versionEndIncluding": "4.1.4", "versionStartIncluding": "4.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue has been found in PowerDNS Recursor from 4.0.0 up to and including 4.1.4. A remote attacker sending a DNS query for a meta-type like OPT can lead to a zone being wrongly cached as failing DNSSEC validation. It only arises if the parent zone is signed, and all the authoritative servers for that parent zone answer with FORMERR to a query for at least one of the meta-types. As a result, subsequent queries from clients requesting DNSSEC validation will be answered with a ServFail." }, { "lang": "es", "value": "Se ha encontrado un problema en PowerDNS Recursor desde la versi\u00f3n 4.0.0 hasta la versi\u00f3n 4.1.4 inclusive. Un atacante remoto que env\u00eda una consulta DNS para un metatipo como OPT puede provocar que una zona se almacene en cach\u00e9 err\u00f3neamente como validaci\u00f3n de DNSSEC fallida. Solo surge si la zona padre est\u00e1 firmada y todos los servidores autorizados para esa zona padre responden con FORMERR a una consulta de al menos uno de los metatipos. Como resultado, las consultas posteriores de los clientes que solicitan la validaci\u00f3n de DNSSEC se responder\u00e1n con un ServFail." } ], "id": "CVE-2018-14644", "lastModified": "2024-11-21T03:49:29.683", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "secalert@redhat.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 2.2, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-11-09T19:29:00.253", "references": [ { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14644" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2018-07.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14644" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2018-07.html" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "secalert@redhat.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
powerdns | recursor | * | |
powerdns | recursor | 2.0_rc1 | |
powerdns | recursor | 2.8 | |
powerdns | recursor | 2.9.15 | |
powerdns | recursor | 2.9.16 | |
powerdns | recursor | 2.9.17 | |
powerdns | recursor | 2.9.18 | |
powerdns | recursor | 3.0 | |
powerdns | recursor | 3.0.1 | |
powerdns | recursor | 3.1 | |
powerdns | recursor | 3.1.1 | |
powerdns | recursor | 3.1.2 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:powerdns:recursor:*:*:*:*:*:*:*:*", "matchCriteriaId": "0FF03280-64C9-43E0-8A79-DDAFAF049119", "versionEndIncluding": "3.1.3", "vulnerable": true }, { "criteria": "cpe:2.3:a:powerdns:recursor:2.0_rc1:*:*:*:*:*:*:*", "matchCriteriaId": "E02559EA-6C7F-4328-A435-B4F69E640645", "vulnerable": true }, { "criteria": "cpe:2.3:a:powerdns:recursor:2.8:*:*:*:*:*:*:*", "matchCriteriaId": "D390616D-8CAB-46D3-864D-09AF99E3A407", "vulnerable": true }, { "criteria": "cpe:2.3:a:powerdns:recursor:2.9.15:*:*:*:*:*:*:*", "matchCriteriaId": "47DFAA6A-CA5B-4B2A-BFC2-A0DF85BF68D8", "vulnerable": true }, { "criteria": "cpe:2.3:a:powerdns:recursor:2.9.16:*:*:*:*:*:*:*", "matchCriteriaId": "306EBF4B-2292-4B14-9835-9FD0E82FE7CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:powerdns:recursor:2.9.17:*:*:*:*:*:*:*", "matchCriteriaId": "3A31C83E-8A81-4483-A245-FD1C08684183", "vulnerable": true }, { "criteria": "cpe:2.3:a:powerdns:recursor:2.9.18:*:*:*:*:*:*:*", "matchCriteriaId": "44D51FCC-8AD6-4461-8F48-B77EB2693C89", "vulnerable": true }, { "criteria": "cpe:2.3:a:powerdns:recursor:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "38DDFF27-8CBB-468D-9837-C74538E5EF0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:powerdns:recursor:3.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "B3920499-3580-4EA6-AD56-6515C3B8495A", "vulnerable": true }, { "criteria": "cpe:2.3:a:powerdns:recursor:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "AF444F17-46F1-4036-B5F1-CA04F7F19684", "vulnerable": true }, { "criteria": "cpe:2.3:a:powerdns:recursor:3.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "FA1E4934-6690-4A09-8E6E-FE7ED57B9DEE", "vulnerable": true }, { "criteria": "cpe:2.3:a:powerdns:recursor:3.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "D474CF9D-1898-46D3-80B1-2D3743265F56", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "PowerDNS Recursor 3.1.3 and earlier allows remote attackers to cause a denial of service (resource exhaustion and application crash) via a CNAME record with a zero TTL, which triggers an infinite loop." }, { "lang": "es", "value": "PowerDNS Recursor 3.1.3 y anteriores permite a atacantes remotos provocar una denegaci\u00f3n de servicio (agotamiento de recursos o ca\u00edda de la aplicaci\u00f3n) mediante un registro CNAME con un TTL a cero, lo cual dispara un bucle infinito." } ], "evaluatorSolution": "This vulnerability is addressed in the following product release:\r\nPowerDNS, Recursor, 3.1.4", "id": "CVE-2006-4252", "lastModified": "2024-11-21T00:15:29.753", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2006-11-14T20:07:00.000", "references": [ { "source": "security@debian.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://doc.powerdns.com/powerdns-advisory-2006-02.html" }, { "source": "security@debian.org", "url": "http://lists.suse.com/archive/suse-security-announce/2006-Nov/0007.html" }, { "source": "security@debian.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/22824" }, { "source": "security@debian.org", "url": "http://secunia.com/advisories/22976" }, { "source": "security@debian.org", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/21037" }, { "source": "security@debian.org", "url": "http://www.vupen.com/english/advisories/2006/4484" }, { "source": "security@debian.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30257" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://doc.powerdns.com/powerdns-advisory-2006-02.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.suse.com/archive/suse-security-announce/2006-Nov/0007.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/22824" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/22976" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/21037" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2006/4484" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30257" } ], "sourceIdentifier": "security@debian.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
var-201001-0029
Vulnerability from variot
Unspecified vulnerability in PowerDNS Recursor before 3.1.7.2 allows remote attackers to spoof DNS data via crafted zones. PowerDNS Recursor is a high performance recursive name server. A remote attacker can trick PowerDNS Recursor into accepting malicious data. The server may incorrectly add records to its cache during parsing of recursive client queries. This is a case of cache poisoning. DNS cache poisoning refers to changing an item in the DNS cache of the DNS server so that the IP address associated with the host name in the cache no longer points to the correct location. For example, if www.example.com maps to the IP address 192.168.0.1 and the mapping exists in the DNS server's cache, an attacker who successfully poisons the server's DNS cache can map www.example.com to 10.0. 0.1. In this case, a user attempting to access www.example.com may contact the wrong web server. PowerDNS is prone to a remote cache-poisoning vulnerability. An attacker can exploit this issue to divert data from a legitimate site to an attacker-specified site. Successful exploits will allow the attacker to manipulate cache data, potentially facilitating man-in-the-middle, site-impersonation, or denial-of-service attacks. PowerDNS 3.1.7.1 and earlier are vulnerable. ----------------------------------------------------------------------
Accurate Vulnerability Scanning No more false positives, no more false negatives
http://secunia.com/vulnerability_scanning/
TITLE: Debian update for pdns-recursor
SECUNIA ADVISORY ID: SA38158
VERIFY ADVISORY: http://secunia.com/advisories/38158/
DESCRIPTION: Debian has issued an update for pdns-recursor. This fixes some vulnerabilities, which can be exploited by malicious people to conduct spoofing attacks and potentially compromise a vulnerable system.
For more information: SA38004
SOLUTION: Reportedly, updated packages will be available soon.
ORIGINAL ADVISORY: DSA-1968-1: http://lists.debian.org/debian-security-announce/2010/msg00003.html
OTHER REFERENCES: SA38004: http://secunia.com/advisories/38004/
About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
Show details on source website
{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201001-0029", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "recursor", "scope": "eq", "trust": 1.6, "vendor": "powerdns", "version": "3.1.7.1" }, { "model": "recursor", "scope": "eq", "trust": 1.6, "vendor": "powerdns", "version": "2.9.15" }, { "model": "recursor", "scope": "eq", "trust": 1.6, "vendor": "powerdns", "version": "3.1.6" }, { "model": "recursor", "scope": "eq", "trust": 1.6, "vendor": "powerdns", "version": "3.1.4" }, { "model": "recursor", "scope": "eq", "trust": 1.6, "vendor": "powerdns", "version": "3.1.5" }, { "model": "recursor", "scope": "eq", "trust": 1.6, "vendor": "powerdns", "version": "3.1.7" }, { "model": "recursor", "scope": "eq", "trust": 1.6, "vendor": "powerdns", "version": "2.0_rc1" }, { "model": "recursor", "scope": "eq", "trust": 1.6, "vendor": "powerdns", "version": "2.8" }, { "model": "recursor", "scope": "eq", "trust": 1.6, "vendor": "powerdns", "version": "2.9.17" }, { "model": "recursor", "scope": "eq", "trust": 1.0, "vendor": "powerdns", "version": "3.1" }, { "model": "recursor", "scope": "eq", "trust": 1.0, "vendor": "powerdns", "version": "3.0" }, { "model": "recursor", "scope": "eq", "trust": 1.0, "vendor": "powerdns", "version": "3.1.1" }, { "model": "recursor", "scope": "eq", "trust": 1.0, "vendor": "powerdns", "version": "2.9.18" }, { "model": "recursor", "scope": "lte", "trust": 1.0, "vendor": "powerdns", "version": "3.1.7.2" }, { "model": "recursor", "scope": "eq", "trust": 1.0, "vendor": "powerdns", "version": "2.9.16" }, { "model": "recursor", "scope": "eq", "trust": 1.0, "vendor": "powerdns", "version": "3.1.3" }, { "model": "recursor", "scope": "eq", "trust": 1.0, "vendor": "powerdns", "version": "3.1.2" }, { "model": "recursor", "scope": "eq", "trust": 1.0, "vendor": "powerdns", "version": "3.0.1" }, { "model": "recursor", "scope": "lt", "trust": 0.8, "vendor": "powerdns", "version": "3.1.7.2" }, { "model": "recursor", "scope": "eq", "trust": 0.6, "vendor": "powerdns", "version": "3.1.7.2" }, { "model": "hat fedora", "scope": "eq", "trust": 0.6, "vendor": "red", "version": "16" }, { "model": "opensuse", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "11.2" }, { "model": "opensuse", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "11.1" }, { "model": "opensuse", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "11.0" }, { "model": "powerdns", "scope": "eq", "trust": 0.3, "vendor": "powerdns", "version": "3.1.7.1" }, { "model": "powerdns", "scope": "eq", "trust": 0.3, "vendor": "powerdns", "version": "3.1.7" }, { "model": "powerdns", "scope": "eq", "trust": 0.3, "vendor": "powerdns", "version": "3.1.6" }, { "model": "powerdns", "scope": "eq", "trust": 0.3, "vendor": "powerdns", "version": "3.1.5" }, { "model": "powerdns", "scope": "eq", "trust": 0.3, "vendor": "powerdns", "version": "3.1.4" }, { "model": "powerdns", "scope": "eq", "trust": 0.3, "vendor": "powerdns", "version": "3.1.3" }, { "model": "powerdns", "scope": "eq", "trust": 0.3, "vendor": "powerdns", "version": "3.1.2" }, { "model": "powerdns", "scope": "eq", "trust": 0.3, "vendor": "powerdns", "version": "3.1.1" }, { "model": "powerdns", "scope": "eq", "trust": 0.3, "vendor": "powerdns", "version": "3.0.1" }, { "model": "powerdns", "scope": "eq", "trust": 0.3, "vendor": "powerdns", "version": "3.0" }, { "model": "powerdns", "scope": "eq", "trust": 0.3, "vendor": "powerdns", "version": "3.1" }, { "model": "linux", "scope": null, "trust": 0.3, "vendor": "gentoo", "version": null }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "linux s/390", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "linux mipsel", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "linux mips", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "linux m68k", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "linux ia-64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "linux ia-32", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "linux hppa", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "linux armel", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "linux arm", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "linux alpha", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "linux s/390", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "linux mipsel", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "linux mips", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "linux m68k", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "linux ia-64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "linux ia-32", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "linux hppa", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "linux armel", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "linux arm", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "linux alpha", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "powerdns", "scope": "ne", "trust": 0.3, "vendor": "powerdns", "version": "3.1.7.2" } ], "sources": [ { "db": "NVD", "id": "CVE-2009-4010" }, { "db": "CNNVD", "id": "CNNVD-201001-052" }, { "db": "CNVD", "id": "CNVD-2010-5502" }, { "db": "JVNDB", "id": "JVNDB-2010-005035" }, { "db": "BID", "id": "37653" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:powerdns:recursor:3.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:powerdns:recursor:3.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:powerdns:recursor:3.1.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:powerdns:recursor:2.0_rc1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:powerdns:recursor:2.9.18:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:powerdns:recursor:2.9.17:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:powerdns:recursor:2.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:powerdns:recursor:2.9.15:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:powerdns:recursor:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:powerdns:recursor:3.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:powerdns:recursor:3.1.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:powerdns:recursor:3.1.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:powerdns:recursor:3.1.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:powerdns:recursor:3.1.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:powerdns:recursor:2.9.16:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:powerdns:recursor:3.1.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:powerdns:recursor:3.1.7.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:powerdns:recursor:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "3.1.7.2", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2009-4010" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "bert hubert bert.hubert@netherlabs.nl", "sources": [ { "db": "CNNVD", "id": "CNNVD-201001-052" } ], "trust": 0.6 }, "cve": "CVE-2009-4010", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/severity#" }, "@id": "https://www.variotdbs.pl/ref/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": true, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2009-4010", "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.8, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.6, "id": "CNVD-2010-5502", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2009-4010", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201001-052", "trust": 0.6, "value": "HIGH" }, { "author": "CNVD", "id": "CNVD-2010-5502", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2009-4010" }, { "db": "CNNVD", "id": "CNNVD-201001-052" }, { "db": "CNVD", "id": "CNVD-2010-5502" }, { "db": "JVNDB", "id": "JVNDB-2010-005035" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Unspecified vulnerability in PowerDNS Recursor before 3.1.7.2 allows remote attackers to spoof DNS data via crafted zones. PowerDNS Recursor is a high performance recursive name server. A remote attacker can trick PowerDNS Recursor into accepting malicious data. The server may incorrectly add records to its cache during parsing of recursive client queries. This is a case of cache poisoning. DNS cache poisoning refers to changing an item in the DNS cache of the DNS server so that the IP address associated with the host name in the cache no longer points to the correct location. For example, if www.example.com maps to the IP address 192.168.0.1 and the mapping exists in the DNS server\u0027s cache, an attacker who successfully poisons the server\u0027s DNS cache can map www.example.com to 10.0. 0.1. In this case, a user attempting to access www.example.com may contact the wrong web server. PowerDNS is prone to a remote cache-poisoning vulnerability. \nAn attacker can exploit this issue to divert data from a legitimate site to an attacker-specified site. \nSuccessful exploits will allow the attacker to manipulate cache data, potentially facilitating man-in-the-middle, site-impersonation, or denial-of-service attacks. \nPowerDNS 3.1.7.1 and earlier are vulnerable. ----------------------------------------------------------------------\n\n\n\nAccurate Vulnerability Scanning\nNo more false positives, no more false negatives\n\nhttp://secunia.com/vulnerability_scanning/\n\n\n\n----------------------------------------------------------------------\n\nTITLE:\nDebian update for pdns-recursor\n\nSECUNIA ADVISORY ID:\nSA38158\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/38158/\n\nDESCRIPTION:\nDebian has issued an update for pdns-recursor. This fixes some\nvulnerabilities, which can be exploited by malicious people to\nconduct spoofing attacks and potentially compromise a vulnerable\nsystem. \n\nFor more information:\nSA38004\n\nSOLUTION:\nReportedly, updated packages will be available soon. \n\nORIGINAL ADVISORY:\nDSA-1968-1:\nhttp://lists.debian.org/debian-security-announce/2010/msg00003.html\n\nOTHER REFERENCES:\nSA38004:\nhttp://secunia.com/advisories/38004/\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\nprivate users keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/advisories/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/advisories/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n", "sources": [ { "db": "NVD", "id": "CVE-2009-4010" }, { "db": "JVNDB", "id": "JVNDB-2010-005035" }, { "db": "CNVD", "id": "CNVD-2010-5502" }, { "db": "BID", "id": "37653" }, { "db": "PACKETSTORM", "id": "85167" } ], "trust": 2.52 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2009-4010", "trust": 3.3 }, { "db": "BID", "id": "37653", "trust": 2.5 }, { "db": "SECUNIA", "id": "38004", "trust": 1.7 }, { "db": "SECUNIA", "id": "38068", "trust": 1.6 }, { "db": "VUPEN", "id": "ADV-2010-0054", "trust": 1.6 }, { "db": "JVNDB", "id": "JVNDB-2010-005035", "trust": 0.8 }, { "db": "FEDORA", "id": "FEDORA-2010-0209", "trust": 0.6 }, { "db": "FEDORA", "id": "FEDORA-2010-0228", "trust": 0.6 }, { "db": "XF", "id": "55439", "trust": 0.6 }, { "db": "NSFOCUS", "id": "14304", "trust": 0.6 }, { "db": "BUGTRAQ", "id": "20100106 CRITICAL POWERDNS RECURSOR SECURITY VULNERABILITIES: PLEASE UPGRADE ASAP TO 3.1.7.2", "trust": 0.6 }, { "db": "SECTRACK", "id": "1023404", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-201001-052", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2010-5502", "trust": 0.6 }, { "db": "SECUNIA", "id": "38158", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "85167", "trust": 0.1 } ], "sources": [ { "db": "NVD", "id": "CVE-2009-4010" }, { "db": "CNNVD", "id": "CNNVD-201001-052" }, { "db": "CNVD", "id": "CNVD-2010-5502" }, { "db": "JVNDB", "id": "JVNDB-2010-005035" }, { "db": "BID", "id": "37653" }, { "db": "PACKETSTORM", "id": "85167" } ] }, "id": "VAR-201001-0029", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2010-5502" } ], "trust": 0.06 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2010-5502" } ] }, "last_update_date": "2021-12-18T17:56:06.278000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "PowerDNS Security Advisory 2010-02", "trust": 0.8, "url": "http://doc.powerdns.com/powerdns-advisory-2010-02.html" }, { "title": "PowerDNS Recursor Remote Cache Patch for Vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/37391" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2010-5502" }, { "db": "JVNDB", "id": "JVNDB-2010-005035" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2009-4010" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.2, "url": "http://www.securityfocus.com/bid/37653" }, { "trust": 1.9, "url": "http://doc.powerdns.com/powerdns-advisory-2010-02.html" }, { "trust": 1.6, "url": "http://secunia.com/advisories/38068" }, { "trust": 1.6, "url": "http://www.vupen.com/english/advisories/2010/0054" }, { "trust": 1.6, "url": "http://securitytracker.com/id?1023404" }, { "trust": 1.6, "url": "https://bugzilla.redhat.com/show_bug.cgi?id=552285" }, { "trust": 1.6, "url": "https://www.redhat.com/archives/fedora-package-announce/2010-january/msg00217.html" }, { "trust": 1.6, "url": "https://www.redhat.com/archives/fedora-package-announce/2010-january/msg00228.html" }, { "trust": 1.6, "url": "http://secunia.com/advisories/38004" }, { "trust": 1.0, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/55439" }, { "trust": 1.0, "url": "http://www.securityfocus.com/archive/1/508743/100/0/threaded" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-4010" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2009-4010" }, { "trust": 0.6, "url": "http://xforce.iss.net/xforce/xfdb/55439" }, { "trust": 0.6, "url": "http://www.securityfocus.com/archive/1/archive/1/508743/100/0/threaded" }, { "trust": 0.6, "url": "http://www.nsfocus.net/vulndb/14304" }, { "trust": 0.3, "url": "http://www.powerdns.com/" }, { "trust": 0.3, "url": "/archive/1/508743" }, { "trust": 0.1, "url": "http://lists.debian.org/debian-security-announce/2010/msg00003.html" }, { "trust": 0.1, "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org" }, { "trust": 0.1, "url": "http://secunia.com/advisories/38004/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/secunia_security_advisories/" }, { "trust": 0.1, "url": "http://secunia.com/vulnerability_scanning/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/38158/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/about_secunia_advisories/" } ], "sources": [ { "db": "NVD", "id": "CVE-2009-4010" }, { "db": "CNNVD", "id": "CNNVD-201001-052" }, { "db": "CNVD", "id": "CNVD-2010-5502" }, { "db": "JVNDB", "id": "JVNDB-2010-005035" }, { "db": "BID", "id": "37653" }, { "db": "PACKETSTORM", "id": "85167" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "NVD", "id": "CVE-2009-4010" }, { "db": "CNNVD", "id": "CNNVD-201001-052" }, { "db": "CNVD", "id": "CNVD-2010-5502" }, { "db": "JVNDB", "id": "JVNDB-2010-005035" }, { "db": "BID", "id": "37653" }, { "db": "PACKETSTORM", "id": "85167" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2010-01-08T17:30:00", "db": "NVD", "id": "CVE-2009-4010" }, { "date": "2010-01-08T00:00:00", "db": "CNNVD", "id": "CNNVD-201001-052" }, { "date": "2010-01-08T00:00:00", "db": "CNVD", "id": "CNVD-2010-5502" }, { "date": "2012-12-20T00:00:00", "db": "JVNDB", "id": "JVNDB-2010-005035" }, { "date": "2010-01-06T00:00:00", "db": "BID", "id": "37653" }, { "date": "2010-01-15T12:24:56", "db": "PACKETSTORM", "id": "85167" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-10-10T19:48:00", "db": "NVD", "id": "CVE-2009-4010" }, { "date": "2010-01-11T00:00:00", "db": "CNNVD", "id": "CNNVD-201001-052" }, { "date": "2010-01-08T00:00:00", "db": "CNVD", "id": "CNVD-2010-5502" }, { "date": "2012-12-20T00:00:00", "db": "JVNDB", "id": "JVNDB-2010-005035" }, { "date": "2015-04-13T21:54:00", "db": "BID", "id": "37653" }, { "date": null, "db": "PACKETSTORM", "id": "85167" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201001-052" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "PowerDNS Recursor Remote cache poisoning vulnerability", "sources": [ { "db": "CNNVD", "id": "CNNVD-201001-052" }, { "db": "CNVD", "id": "CNVD-2010-5502" }, { "db": "BID", "id": "37653" } ], "trust": 1.5 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "lack of information", "sources": [ { "db": "CNNVD", "id": "CNNVD-201001-052" } ], "trust": 0.6 } }
var-201811-0292
Vulnerability from variot
An issue has been found in PowerDNS Recursor from 4.0.0 up to and including 4.1.4. A remote attacker sending a DNS query for a meta-type like OPT can lead to a zone being wrongly cached as failing DNSSEC validation. It only arises if the parent zone is signed, and all the authoritative servers for that parent zone answer with FORMERR to a query for at least one of the meta-types. As a result, subsequent queries from clients requesting DNSSEC validation will be answered with a ServFail. PowerDNS Recursor Contains an input validation vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. PowerDNSRecursor (aka pdns_recursor) is a domain name resolution server from the Dutch PowerDNS company. There are security vulnerabilities in PowerDNSRecursor version 4.0.0 to 4.1.4
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201811-0292", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "recursor", "scope": "lte", "trust": 1.0, "vendor": "powerdns", "version": "4.1.4" }, { "model": "recursor", "scope": "gte", "trust": 1.0, "vendor": "powerdns", "version": "4.0.0" }, { "model": "recursor", "scope": "eq", "trust": 0.8, "vendor": "powerdns", "version": "4.0.0 to 4.1.4" }, { "model": "recursor", "scope": "gte", "trust": 0.6, "vendor": "powerdns", "version": "4.0.0\u003c=4.1.4" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-23738" }, { "db": "JVNDB", "id": "JVNDB-2018-014050" }, { "db": "NVD", "id": "CVE-2018-14644" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:powerdns:recursor:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "4.1.4", "versionStartIncluding": "4.0.0", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2018-14644" } ] }, "cve": "CVE-2018-14644", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Medium", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 4.3, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2018-14644", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CNVD-2018-23738", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "HIGH", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 2.2, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "secalert@redhat.com", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 1.4, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, { "attackComplexity": "High", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 5.9, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2018-14644", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2018-14644", "trust": 1.8, "value": "MEDIUM" }, { "author": "secalert@redhat.com", "id": "CVE-2018-14644", "trust": 1.0, "value": "MEDIUM" }, { "author": "CNVD", "id": "CNVD-2018-23738", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201811-249", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2018-14644", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-23738" }, { "db": "VULMON", "id": "CVE-2018-14644" }, { "db": "JVNDB", "id": "JVNDB-2018-014050" }, { "db": "NVD", "id": "CVE-2018-14644" }, { "db": "NVD", "id": "CVE-2018-14644" }, { "db": "CNNVD", "id": "CNNVD-201811-249" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "An issue has been found in PowerDNS Recursor from 4.0.0 up to and including 4.1.4. A remote attacker sending a DNS query for a meta-type like OPT can lead to a zone being wrongly cached as failing DNSSEC validation. It only arises if the parent zone is signed, and all the authoritative servers for that parent zone answer with FORMERR to a query for at least one of the meta-types. As a result, subsequent queries from clients requesting DNSSEC validation will be answered with a ServFail. PowerDNS Recursor Contains an input validation vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. PowerDNSRecursor (aka pdns_recursor) is a domain name resolution server from the Dutch PowerDNS company. There are security vulnerabilities in PowerDNSRecursor version 4.0.0 to 4.1.4", "sources": [ { "db": "NVD", "id": "CVE-2018-14644" }, { "db": "JVNDB", "id": "JVNDB-2018-014050" }, { "db": "CNVD", "id": "CNVD-2018-23738" }, { "db": "VULMON", "id": "CVE-2018-14644" } ], "trust": 2.25 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2018-14644", "trust": 3.1 }, { "db": "JVNDB", "id": "JVNDB-2018-014050", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2018-23738", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-201811-249", "trust": 0.6 }, { "db": "VULMON", "id": "CVE-2018-14644", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-23738" }, { "db": "VULMON", "id": "CVE-2018-14644" }, { "db": "JVNDB", "id": "JVNDB-2018-014050" }, { "db": "NVD", "id": "CVE-2018-14644" }, { "db": "CNNVD", "id": "CNNVD-201811-249" } ] }, "id": "VAR-201811-0292", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2018-23738" } ], "trust": 0.06 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-23738" } ] }, "last_update_date": "2023-12-18T13:28:42.220000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "PowerDNS Security Advisory 2018-07", "trust": 0.8, "url": "https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2018-07.html" }, { "title": "Patch for PowerDNSRecursor Denial of Service Vulnerability (CNVD-2018-23738)", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/145203" }, { "title": "PowerDNS Recursor Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=86705" }, { "title": "Debian CVElist Bug Report Logs: CVE-2018-10851 CVE-2018-14626 CVE-2018-14644", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs\u0026qid=863af6e280236a7439b938b435e11826" }, { "title": "Arch Linux Issues: ", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=arch_linux_issues\u0026qid=cve-2018-14644" }, { "title": "Arch Linux Advisories: [ASA-201811-13] powerdns-recursor: denial of service", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=arch_linux_advisories\u0026qid=asa-201811-13" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-23738" }, { "db": "VULMON", "id": "CVE-2018-14644" }, { "db": "JVNDB", "id": "JVNDB-2018-014050" }, { "db": "CNNVD", "id": "CNNVD-201811-249" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-014050" }, { "db": "NVD", "id": "CVE-2018-14644" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.3, "url": "https://bugzilla.redhat.com/show_bug.cgi?id=cve-2018-14644" }, { "trust": 1.7, "url": "https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2018-07.html" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-14644" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-14644" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/20.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=913162" }, { "trust": 0.1, "url": "https://security.archlinux.org/cve-2018-14644" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-23738" }, { "db": "VULMON", "id": "CVE-2018-14644" }, { "db": "JVNDB", "id": "JVNDB-2018-014050" }, { "db": "NVD", "id": "CVE-2018-14644" }, { "db": "CNNVD", "id": "CNNVD-201811-249" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2018-23738" }, { "db": "VULMON", "id": "CVE-2018-14644" }, { "db": "JVNDB", "id": "JVNDB-2018-014050" }, { "db": "NVD", "id": "CVE-2018-14644" }, { "db": "CNNVD", "id": "CNNVD-201811-249" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-11-22T00:00:00", "db": "CNVD", "id": "CNVD-2018-23738" }, { "date": "2018-11-09T00:00:00", "db": "VULMON", "id": "CVE-2018-14644" }, { "date": "2019-03-11T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-014050" }, { "date": "2018-11-09T19:29:00.253000", "db": "NVD", "id": "CVE-2018-14644" }, { "date": "2018-11-12T00:00:00", "db": "CNNVD", "id": "CNNVD-201811-249" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-11-23T00:00:00", "db": "CNVD", "id": "CNVD-2018-23738" }, { "date": "2019-10-09T00:00:00", "db": "VULMON", "id": "CVE-2018-14644" }, { "date": "2019-03-11T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-014050" }, { "date": "2019-10-09T23:35:05.687000", "db": "NVD", "id": "CVE-2018-14644" }, { "date": "2019-10-17T00:00:00", "db": "CNNVD", "id": "CNNVD-201811-249" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201811-249" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "PowerDNS Recursor Input validation vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-014050" }, { "db": "CNNVD", "id": "CNNVD-201811-249" } ], "trust": 1.4 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201811-249" } ], "trust": 0.6 } }
var-201202-0180
Vulnerability from variot
The resolver in PowerDNS Recursor (aka pdns_recursor) 3.3 overwrites cached server names and TTL values in NS records during the processing of a response to an A record query, which allows remote attackers to trigger continued resolvability of revoked domain names via a "ghost domain names" attack. PowerDNS Recursor is a high performance recursive name server. A vulnerability exists in the resolver in version 3.3 of PowerDNS Recursor (also known as pdns_recursor). The cache server name and TTL value in the NS record are overwritten during the processing of the query record response. Successfully exploiting these issues will allow an attacker to manipulate cache data, which may aid in further attacks. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201412-33
http://security.gentoo.org/
Severity: High Title: PowerDNS Recursor: Multiple vulnerabilities Date: December 22, 2014 Bugs: #299942, #404377, #514946, #531992 ID: 201412-33
Synopsis
Multiple vulnerabilities have been found in PowerDNS Recursor, the worst of which may allow execution of arbitrary code.
Background
PowerDNS Recursor is a high-end, high-performance resolving name server
Affected packages
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 net-dns/pdns-recursor < 3.6.1-r1 >= 3.6.1-r1
Description
Multiple vulnerabilities have been discovered in PowerDNS Recursor. Please review the CVE identifiers and PowerDNS blog post referenced below for details.
Impact
A remote attacker may be able to send specially crafted packets, possibly resulting in arbitrary code execution or a Denial of Service condition. Furthermore, a remote attacker may be able to spoof DNS data.
Workaround
There is no known workaround at this time.
Resolution
All PowerDNS Recursor users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=net-dns/pdns-recursor-3.6.1-r1"=
References
[ 1 ] CVE-2009-4009 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4009 [ 2 ] CVE-2009-4010 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4010 [ 3 ] CVE-2012-1193 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1193 [ 4 ] CVE-2014-8601 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8601 [ 5 ] Related to recent DoS attacks: Recursor configuration file guidance
http://blog.powerdns.com/2014/02/06/related-to-recent-dos-attacks-recurso= r-configuration-file-guidance/
Availability
This GLSA and any updates to it are available for viewing at the Gentoo Security Website:
http://security.gentoo.org/glsa/glsa-201412-33.xml
Concerns?
Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.
License
Copyright 2014 Gentoo Foundation, Inc; referenced text belongs to its owner(s).
The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201202-0180", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "recursor", "scope": "eq", "trust": 3.0, "vendor": "powerdns", "version": "3.3" }, { "model": "recursive server", "scope": "eq", "trust": 0.3, "vendor": "powerdns", "version": "3.3" }, { "model": "linux", "scope": null, "trust": 0.3, "vendor": "gentoo", "version": null }, { "model": "recursive server", "scope": "ne", "trust": 0.3, "vendor": "powerdns", "version": "3.5" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2012-9038" }, { "db": "BID", "id": "59348" }, { "db": "JVNDB", "id": "JVNDB-2012-001509" }, { "db": "NVD", "id": "CVE-2012-1193" }, { "db": "CNNVD", "id": "CNNVD-201202-351" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:powerdns:powerdns_recursor:3.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2012-1193" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The vendor reported this issue.", "sources": [ { "db": "BID", "id": "59348" } ], "trust": 0.3 }, "cve": "CVE-2012-1193", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 4.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 6.4, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2012-1193", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 0.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CNVD-2012-9038", "impactScore": 0.0, "integrityImpact": "NONE", "severity": "LOW", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:N", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2012-1193", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNVD", "id": "CNVD-2012-9038", "trust": 0.6, "value": "LOW" }, { "author": "CNNVD", "id": "CNNVD-201202-351", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2012-9038" }, { "db": "JVNDB", "id": "JVNDB-2012-001509" }, { "db": "NVD", "id": "CVE-2012-1193" }, { "db": "CNNVD", "id": "CNNVD-201202-351" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The resolver in PowerDNS Recursor (aka pdns_recursor) 3.3 overwrites cached server names and TTL values in NS records during the processing of a response to an A record query, which allows remote attackers to trigger continued resolvability of revoked domain names via a \"ghost domain names\" attack. PowerDNS Recursor is a high performance recursive name server. A vulnerability exists in the resolver in version 3.3 of PowerDNS Recursor (also known as pdns_recursor). The cache server name and TTL value in the NS record are overwritten during the processing of the query record response. \nSuccessfully exploiting these issues will allow an attacker to manipulate cache data, which may aid in further attacks. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\nGentoo Linux Security Advisory GLSA 201412-33\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n http://security.gentoo.org/\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\n Severity: High\n Title: PowerDNS Recursor: Multiple vulnerabilities\n Date: December 22, 2014\n Bugs: #299942, #404377, #514946, #531992\n ID: 201412-33\n\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\nSynopsis\n========\n\nMultiple vulnerabilities have been found in PowerDNS Recursor, the\nworst of which may allow execution of arbitrary code. \n\nBackground\n==========\n\nPowerDNS Recursor is a high-end, high-performance resolving name server\n\nAffected packages\n=================\n\n -------------------------------------------------------------------\n Package / Vulnerable / Unaffected\n -------------------------------------------------------------------\n 1 net-dns/pdns-recursor \u003c 3.6.1-r1 \u003e= 3.6.1-r1\n\nDescription\n===========\n\nMultiple vulnerabilities have been discovered in PowerDNS Recursor. \nPlease review the CVE identifiers and PowerDNS blog post referenced\nbelow for details. \n\nImpact\n======\n\nA remote attacker may be able to send specially crafted packets,\npossibly resulting in arbitrary code execution or a Denial of Service\ncondition. Furthermore, a remote attacker may be able to spoof DNS\ndata. \n\nWorkaround\n==========\n\nThere is no known workaround at this time. \n\nResolution\n==========\n\nAll PowerDNS Recursor users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose \"\u003e=net-dns/pdns-recursor-3.6.1-r1\"=\n\n\nReferences\n==========\n\n[ 1 ] CVE-2009-4009\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4009\n[ 2 ] CVE-2009-4010\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4010\n[ 3 ] CVE-2012-1193\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1193\n[ 4 ] CVE-2014-8601\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8601\n[ 5 ] Related to recent DoS attacks: Recursor configuration file\n guidance\n\nhttp://blog.powerdns.com/2014/02/06/related-to-recent-dos-attacks-recurso=\nr-configuration-file-guidance/\n\nAvailability\n============\n\nThis GLSA and any updates to it are available for viewing at\nthe Gentoo Security Website:\n\n http://security.gentoo.org/glsa/glsa-201412-33.xml\n\nConcerns?\n=========\n\nSecurity is a primary focus of Gentoo Linux and ensuring the\nconfidentiality and security of our users\u0027 machines is of utmost\nimportance to us. Any security concerns should be addressed to\nsecurity@gentoo.org or alternatively, you may file a bug at\nhttps://bugs.gentoo.org. \n\nLicense\n=======\n\nCopyright 2014 Gentoo Foundation, Inc; referenced text\nbelongs to its owner(s). \n\nThe contents of this document are licensed under the\nCreative Commons - Attribution / Share Alike license. \n\nhttp://creativecommons.org/licenses/by-sa/2.5\n", "sources": [ { "db": "NVD", "id": "CVE-2012-1193" }, { "db": "JVNDB", "id": "JVNDB-2012-001509" }, { "db": "CNVD", "id": "CNVD-2012-9038" }, { "db": "BID", "id": "59348" }, { "db": "PACKETSTORM", "id": "129691" } ], "trust": 2.52 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2012-1193", "trust": 3.4 }, { "db": "CERT/CC", "id": "VU#542123", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2012-001509", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2012-9038", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-201202-351", "trust": 0.6 }, { "db": "BID", "id": "59348", "trust": 0.3 }, { "db": "PACKETSTORM", "id": "129691", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2012-9038" }, { "db": "BID", "id": "59348" }, { "db": "JVNDB", "id": "JVNDB-2012-001509" }, { "db": "PACKETSTORM", "id": "129691" }, { "db": "NVD", "id": "CVE-2012-1193" }, { "db": "CNNVD", "id": "CNNVD-201202-351" } ] }, "id": "VAR-201202-0180", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2012-9038" } ], "trust": 0.06 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2012-9038" } ] }, "last_update_date": "2023-12-18T11:24:01.545000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Top Page", "trust": 0.8, "url": "http://www.powerdns.com" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2012-001509" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 }, { "problemtype": "CWE-DesignError", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2012-001509" }, { "db": "NVD", "id": "CVE-2012-1193" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.6, "url": "https://www.isc.org/files/imce/ghostdomain_camera.pdf" }, { "trust": 1.0, "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-april/102729.html" }, { "trust": 1.0, "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-may/104173.html" }, { "trust": 1.0, "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-may/104177.html" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-1193" }, { "trust": 0.8, "url": "http://jprs.jp/tech/notice/2012-02-17-ghost-domain-names.html" }, { "trust": 0.8, "url": "http://jvn.jp/cert/jvnvu542123" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-1193" }, { "trust": 0.8, "url": "http://www.kb.cert.org/vuls/id/542123" }, { "trust": 0.6, "url": "http://web.nvd.nist.gov/view/vuln/search-results?query=cve-2012-1193" }, { "trust": 0.3, "url": "http://www.powerdns.com/" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-4009" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2009-4010" }, { "trust": 0.1, "url": "http://creativecommons.org/licenses/by-sa/2.5" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1193" }, { "trust": 0.1, "url": "http://security.gentoo.org/glsa/glsa-201412-33.xml" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-1193" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2009-4009" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-8601" }, { "trust": 0.1, "url": "http://security.gentoo.org/" }, { "trust": 0.1, "url": "http://blog.powerdns.com/2014/02/06/related-to-recent-dos-attacks-recurso=" }, { "trust": 0.1, "url": "https://bugs.gentoo.org." }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-4010" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-8601" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2012-9038" }, { "db": "BID", "id": "59348" }, { "db": "JVNDB", "id": "JVNDB-2012-001509" }, { "db": "PACKETSTORM", "id": "129691" }, { "db": "NVD", "id": "CVE-2012-1193" }, { "db": "CNNVD", "id": "CNNVD-201202-351" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2012-9038" }, { "db": "BID", "id": "59348" }, { "db": "JVNDB", "id": "JVNDB-2012-001509" }, { "db": "PACKETSTORM", "id": "129691" }, { "db": "NVD", "id": "CVE-2012-1193" }, { "db": "CNNVD", "id": "CNNVD-201202-351" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2012-02-20T00:00:00", "db": "CNVD", "id": "CNVD-2012-9038" }, { "date": "2013-02-27T00:00:00", "db": "BID", "id": "59348" }, { "date": "2012-02-21T00:00:00", "db": "JVNDB", "id": "JVNDB-2012-001509" }, { "date": "2014-12-23T15:40:47", "db": "PACKETSTORM", "id": "129691" }, { "date": "2012-02-17T22:55:00.747000", "db": "NVD", "id": "CVE-2012-1193" }, { "date": "2012-02-20T00:00:00", "db": "CNNVD", "id": "CNNVD-201202-351" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2012-02-20T00:00:00", "db": "CNVD", "id": "CNVD-2012-9038" }, { "date": "2015-05-07T17:16:00", "db": "BID", "id": "59348" }, { "date": "2012-02-21T00:00:00", "db": "JVNDB", "id": "JVNDB-2012-001509" }, { "date": "2013-12-13T04:57:32.960000", "db": "NVD", "id": "CVE-2012-1193" }, { "date": "2012-02-20T00:00:00", "db": "CNNVD", "id": "CNNVD-201202-351" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201202-351" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "PowerDNS Vulnerabilities that allow continuous name resolution for invalid domain names", "sources": [ { "db": "JVNDB", "id": "JVNDB-2012-001509" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Design Error", "sources": [ { "db": "BID", "id": "59348" }, { "db": "CNNVD", "id": "CNNVD-201202-351" } ], "trust": 0.9 } }
var-201001-0677
Vulnerability from variot
Unspecified vulnerability in PowerDNS Recursor before 3.1.7.2 allows remote attackers to spoof DNS data via crafted zones. PowerDNS Recursor is a high performance recursive name server. A remote attacker can trick PowerDNS Recursor into accepting malicious data. The server may incorrectly add records to its cache during parsing of recursive client queries. This is a case of cache poisoning. DNS cache poisoning refers to changing an item in the DNS cache of the DNS server so that the IP address associated with the host name in the cache no longer points to the correct location. For example, if www.example.com maps to the IP address 192.168.0.1 and the mapping exists in the DNS server's cache, an attacker who successfully poisons the server's DNS cache can map www.example.com to 10.0. 0.1. In this case, a user attempting to access www.example.com may contact the wrong web server. PowerDNS is prone to a remote cache-poisoning vulnerability. An attacker can exploit this issue to divert data from a legitimate site to an attacker-specified site. Successful exploits will allow the attacker to manipulate cache data, potentially facilitating man-in-the-middle, site-impersonation, or denial-of-service attacks. PowerDNS 3.1.7.1 and earlier are vulnerable. (Note that the etch version of pdns-recursor was not vulnerable to CVE-2009-4009.)
Extra care should be applied when installing this update. Major differences in internal domain name processing made backporting just the security fix too difficult.
For more information: SA38004
SOLUTION: Apply updated packages using the yum utility ("yum update pdns-recursor"). ----------------------------------------------------------------------
Accurate Vulnerability Scanning No more false positives, no more false negatives
http://secunia.com/vulnerability_scanning/
TITLE: PowerDNS Recursor Spoofing and Buffer Overflow Vulnerabilities
SECUNIA ADVISORY ID: SA38004
VERIFY ADVISORY: http://secunia.com/advisories/38004/
DESCRIPTION: Some vulnerabilities have been reported in PowerDNS Recursor, which can be exploited by malicious people to conduct spoofing attacks and potentially compromise a vulnerable system.
1) An unspecified error exists when handling certain specially crafted packets, which can be exploited to cause a buffer overflow.
Successful exploitation may allow execution of arbitrary code.
The vulnerabilities are reported in PowerDNS Recursor version 3.1.7.1 and prior. PowerDNS Authoritative ('pdns_server') is not affected.
SOLUTION: Update to version 3.1.7.2. http://www.powerdns.com/en/downloads.aspx
PROVIDED AND/OR DISCOVERED BY: The vendor credits anonymous third parties.
ORIGINAL ADVISORY: 1) http://doc.powerdns.com/powerdns-advisory-2010-01.html 2) http://doc.powerdns.com/powerdns-advisory-2010-02.html
About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201412-33
http://security.gentoo.org/
Severity: High Title: PowerDNS Recursor: Multiple vulnerabilities Date: December 22, 2014 Bugs: #299942, #404377, #514946, #531992 ID: 201412-33
Synopsis
Multiple vulnerabilities have been found in PowerDNS Recursor, the worst of which may allow execution of arbitrary code.
Background
PowerDNS Recursor is a high-end, high-performance resolving name server
Affected packages
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 net-dns/pdns-recursor < 3.6.1-r1 >= 3.6.1-r1
Description
Multiple vulnerabilities have been discovered in PowerDNS Recursor. Please review the CVE identifiers and PowerDNS blog post referenced below for details.
Impact
A remote attacker may be able to send specially crafted packets, possibly resulting in arbitrary code execution or a Denial of Service condition.
Workaround
There is no known workaround at this time.
Resolution
All PowerDNS Recursor users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=net-dns/pdns-recursor-3.6.1-r1"=
References
[ 1 ] CVE-2009-4009 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4009 [ 2 ] CVE-2009-4010 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4010 [ 3 ] CVE-2012-1193 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1193 [ 4 ] CVE-2014-8601 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8601 [ 5 ] Related to recent DoS attacks: Recursor configuration file guidance
http://blog.powerdns.com/2014/02/06/related-to-recent-dos-attacks-recurso= r-configuration-file-guidance/
Availability
This GLSA and any updates to it are available for viewing at the Gentoo Security Website:
http://security.gentoo.org/glsa/glsa-201412-33.xml
Concerns?
Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.
License
Copyright 2014 Gentoo Foundation, Inc; referenced text belongs to its owner(s).
The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5 . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
Debian Security Advisory DSA-1968-1 security@debian.org http://www.debian.org/security/ Florian Weimer January 08, 2010 http://www.debian.org/security/faq
Package : pdns-recursor Vulnerability : several Problem type : remote Debian-specific: no CVE Id(s) : CVE-2009-4009 CVE-2009-4010
It was discovered that pdns-recursor, the PowerDNS recursive name server, contains several vulnerabilities:
A buffer overflow can be exploited to crash the daemon, or potentially execute arbitrary code (CVE-2009-4009).
For the old stable distribution (etch), fixed packages will be provided soon.
For the stable distribution (lenny), these problems have been fixed in version 3.1.7-1+lenny1.
For the unstable distribution (sid), these problems have been fixed in version 3.1.7.2-1.
We recommend that you upgrade your pdns-recursor package.
Upgrade instructions
wget url will fetch the file for you dpkg -i file.deb will install the referenced file.
If you are using the apt-get package manager, use the line for sources.list as given below:
apt-get update will update the internal database apt-get upgrade will install corrected packages
You may use an automated update by adding the resources from the footer to the proper configuration.
Debian GNU/Linux 5.0 alias lenny
Source archives:
http://security.debian.org/pool/updates/main/p/pdns-recursor/pdns-recursor_3.1.7.orig.tar.gz Size/MD5 checksum: 211760 38c58fef666685d6756da97baf9b4d51 http://security.debian.org/pool/updates/main/p/pdns-recursor/pdns-recursor_3.1.7-1+lenny1.dsc Size/MD5 checksum: 1654 fff9beb43eec355ca42d93d53c1ce299 http://security.debian.org/pool/updates/main/p/pdns-recursor/pdns-recursor_3.1.7-1+lenny1.diff.gz Size/MD5 checksum: 14769 8794fecd11f1b014592e2a36d40aaaf6
alpha architecture (DEC Alpha)
http://security.debian.org/pool/updates/main/p/pdns-recursor/pdns-recursor_3.1.7-1+lenny1_alpha.deb Size/MD5 checksum: 545726 dc05fab76c0fcb051b9a428cfa126061
amd64 architecture (AMD x86_64 (AMD64))
http://security.debian.org/pool/updates/main/p/pdns-recursor/pdns-recursor_3.1.7-1+lenny1_amd64.deb Size/MD5 checksum: 440822 365fc4da2fd1770f8e62f1a3a0046231
i386 architecture (Intel ia32)
http://security.debian.org/pool/updates/main/p/pdns-recursor/pdns-recursor_3.1.7-1+lenny1_i386.deb Size/MD5 checksum: 440686 ac26d27658892619ce539921796bce67
ia64 architecture (Intel ia64)
http://security.debian.org/pool/updates/main/p/pdns-recursor/pdns-recursor_3.1.7-1+lenny1_ia64.deb Size/MD5 checksum: 631308 f80c2d28ee6d9ebdbf6cad177c8fbddd
powerpc architecture (PowerPC)
http://security.debian.org/pool/updates/main/p/pdns-recursor/pdns-recursor_3.1.7-1+lenny1_powerpc.deb Size/MD5 checksum: 463434 f0bba833d4231bb2237433373e888a12
s390 architecture (IBM S/390)
http://security.debian.org/pool/updates/main/p/pdns-recursor/pdns-recursor_3.1.7-1+lenny1_s390.deb Size/MD5 checksum: 428138 994a5190fa0f73b49252bee0a695fb4d
These files will probably be moved into the stable distribution on its next update.
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show
iQEcBAEBAgAGBQJLR6jtAAoJEL97/wQC1SS+RxkH/0esg7lQO3qDCRJw32DPNjI0 zlHI6Z6jvWyhYnitqfrzuXdgU18Nq5txdLvJlllQOtxVOnwXAaVOSHCELc0c4i2D DC0JLWGm43n6RBxEteJsx83xN5yucVg4c7KvSjDM2lHkcOnXL+Z6Qz93pFgoL9wF x6uBdBBV3+YqrvHvl8hV0fHQPyMYvE6x2sJ5eBm6bluXCPgNYviFtiCTx1HUUTBn csGvkDSX81vFe07AKWr41ZiC0p5vesyJC4V6ljB2l9UWPLGT1pKZSuByfdNYMgvV guGTqguJzcjaoQ8Cn619Rmqn513N8itRyIqb8gI9E+YmcizBIdLHDi4JSsD/ikA= =XCaJ -----END PGP SIGNATURE-----
Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201001-0677", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "recursor", "scope": "eq", "trust": 1.6, "vendor": "powerdns", "version": "3.1.5" }, { "model": "recursor", "scope": "eq", "trust": 1.6, "vendor": "powerdns", "version": "3.1.6" }, { "model": "recursor", "scope": "eq", "trust": 1.6, "vendor": "powerdns", "version": "2.0_rc1" }, { "model": "recursor", "scope": "eq", "trust": 1.6, "vendor": "powerdns", "version": "3.1.7.1" }, { "model": "recursor", "scope": "eq", "trust": 1.6, "vendor": "powerdns", "version": "2.8" }, { "model": "recursor", "scope": "eq", "trust": 1.6, "vendor": "powerdns", "version": "3.1.7" }, { "model": "recursor", "scope": "eq", "trust": 1.6, "vendor": "powerdns", "version": "3.1.4" }, { "model": "recursor", "scope": "eq", "trust": 1.6, "vendor": "powerdns", "version": "2.9.15" }, { "model": "recursor", "scope": "eq", "trust": 1.6, "vendor": "powerdns", "version": "2.9.17" }, { "model": "recursor", "scope": "eq", "trust": 1.0, "vendor": "powerdns", "version": "3.1" }, { "model": "recursor", "scope": "lte", "trust": 1.0, "vendor": "powerdns", "version": "3.1.7.2" }, { "model": "recursor", "scope": "eq", "trust": 1.0, "vendor": "powerdns", "version": "2.9.18" }, { "model": "recursor", "scope": "eq", "trust": 1.0, "vendor": "powerdns", "version": "2.9.16" }, { "model": "recursor", "scope": "eq", "trust": 1.0, "vendor": "powerdns", "version": "3.1.3" }, { "model": "recursor", "scope": "eq", "trust": 1.0, "vendor": "powerdns", "version": "3.1.2" }, { "model": "recursor", "scope": "eq", "trust": 1.0, "vendor": "powerdns", "version": "3.0.1" }, { "model": "recursor", "scope": "eq", "trust": 1.0, "vendor": "powerdns", "version": "3.0" }, { "model": "recursor", "scope": "eq", "trust": 1.0, "vendor": "powerdns", "version": "3.1.1" }, { "model": "recursor", "scope": "lt", "trust": 0.8, "vendor": "powerdns", "version": "3.1.7.2" }, { "model": "hat fedora", "scope": "eq", "trust": 0.6, "vendor": "red", "version": "16" }, { "model": "recursor", "scope": "eq", "trust": 0.6, "vendor": "powerdns", "version": "3.1.7.2" }, { "model": "opensuse", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "11.2" }, { "model": "opensuse", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "11.1" }, { "model": "opensuse", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "11.0" }, { "model": "powerdns", "scope": "eq", "trust": 0.3, "vendor": "powerdns", "version": "3.1.7.1" }, { "model": "powerdns", "scope": "eq", "trust": 0.3, "vendor": "powerdns", "version": "3.1.7" }, { "model": "powerdns", "scope": "eq", "trust": 0.3, "vendor": "powerdns", "version": "3.1.6" }, { "model": "powerdns", "scope": "eq", "trust": 0.3, "vendor": "powerdns", "version": "3.1.5" }, { "model": "powerdns", "scope": "eq", "trust": 0.3, "vendor": "powerdns", "version": "3.1.4" }, { "model": "powerdns", "scope": "eq", "trust": 0.3, "vendor": "powerdns", "version": "3.1.3" }, { "model": "powerdns", "scope": "eq", "trust": 0.3, "vendor": "powerdns", "version": "3.1.2" }, { "model": "powerdns", "scope": "eq", "trust": 0.3, "vendor": "powerdns", "version": "3.1.1" }, { "model": "powerdns", "scope": "eq", "trust": 0.3, "vendor": "powerdns", "version": "3.0.1" }, { "model": "powerdns", "scope": "eq", "trust": 0.3, "vendor": "powerdns", "version": "3.0" }, { "model": "powerdns", "scope": "eq", "trust": 0.3, "vendor": "powerdns", "version": "3.1" }, { "model": "linux", "scope": null, "trust": 0.3, "vendor": "gentoo", "version": null }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "linux s/390", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "linux mipsel", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "linux mips", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "linux m68k", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "linux ia-64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "linux ia-32", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "linux hppa", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "linux armel", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "linux arm", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "linux alpha", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "linux s/390", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "linux mipsel", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "linux mips", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "linux m68k", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "linux ia-64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "linux ia-32", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "linux hppa", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "linux armel", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "linux arm", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "linux alpha", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "powerdns", "scope": "ne", "trust": 0.3, "vendor": "powerdns", "version": "3.1.7.2" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2010-5502" }, { "db": "BID", "id": "37653" }, { "db": "JVNDB", "id": "JVNDB-2010-005035" }, { "db": "NVD", "id": "CVE-2009-4010" }, { "db": "CNNVD", "id": "CNNVD-201001-052" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:powerdns:recursor:3.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:powerdns:recursor:3.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:powerdns:recursor:3.1.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:powerdns:recursor:2.0_rc1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:powerdns:recursor:2.9.18:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:powerdns:recursor:2.9.17:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:powerdns:recursor:2.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:powerdns:recursor:2.9.15:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:powerdns:recursor:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:powerdns:recursor:3.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:powerdns:recursor:3.1.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:powerdns:recursor:3.1.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:powerdns:recursor:3.1.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:powerdns:recursor:3.1.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:powerdns:recursor:2.9.16:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:powerdns:recursor:3.1.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:powerdns:recursor:3.1.7.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:powerdns:recursor:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "3.1.7.2", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2009-4010" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "bert hubert bert.hubert@netherlabs.nl", "sources": [ { "db": "CNNVD", "id": "CNNVD-201001-052" } ], "trust": 0.6 }, "cve": "CVE-2009-4010", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": true, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 7.5, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2009-4010", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.6, "id": "CNVD-2010-5502", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2009-4010", "trust": 1.8, "value": "HIGH" }, { "author": "CNVD", "id": "CNVD-2010-5502", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201001-052", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2010-5502" }, { "db": "JVNDB", "id": "JVNDB-2010-005035" }, { "db": "NVD", "id": "CVE-2009-4010" }, { "db": "CNNVD", "id": "CNNVD-201001-052" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Unspecified vulnerability in PowerDNS Recursor before 3.1.7.2 allows remote attackers to spoof DNS data via crafted zones. PowerDNS Recursor is a high performance recursive name server. A remote attacker can trick PowerDNS Recursor into accepting malicious data. The server may incorrectly add records to its cache during parsing of recursive client queries. This is a case of cache poisoning. DNS cache poisoning refers to changing an item in the DNS cache of the DNS server so that the IP address associated with the host name in the cache no longer points to the correct location. For example, if www.example.com maps to the IP address 192.168.0.1 and the mapping exists in the DNS server\u0027s cache, an attacker who successfully poisons the server\u0027s DNS cache can map www.example.com to 10.0. 0.1. In this case, a user attempting to access www.example.com may contact the wrong web server. PowerDNS is prone to a remote cache-poisoning vulnerability. \nAn attacker can exploit this issue to divert data from a legitimate site to an attacker-specified site. \nSuccessful exploits will allow the attacker to manipulate cache data, potentially facilitating man-in-the-middle, site-impersonation, or denial-of-service attacks. \nPowerDNS 3.1.7.1 and earlier are vulnerable. (Note that the\netch version of pdns-recursor was not vulnerable to CVE-2009-4009.)\n\nExtra care should be applied when installing this update. Major differences in internal domain name processing made\nbackporting just the security fix too difficult. \n\nFor more information:\nSA38004\n\nSOLUTION:\nApply updated packages using the yum utility (\"yum update\npdns-recursor\"). ----------------------------------------------------------------------\n\n\n\nAccurate Vulnerability Scanning\nNo more false positives, no more false negatives\n\nhttp://secunia.com/vulnerability_scanning/\n\n\n\n----------------------------------------------------------------------\n\nTITLE:\nPowerDNS Recursor Spoofing and Buffer Overflow Vulnerabilities\n\nSECUNIA ADVISORY ID:\nSA38004\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/38004/\n\nDESCRIPTION:\nSome vulnerabilities have been reported in PowerDNS Recursor, which\ncan be exploited by malicious people to conduct spoofing attacks and\npotentially compromise a vulnerable system. \n\n1) An unspecified error exists when handling certain specially\ncrafted packets, which can be exploited to cause a buffer overflow. \n\nSuccessful exploitation may allow execution of arbitrary code. \n\nThe vulnerabilities are reported in PowerDNS Recursor version 3.1.7.1\nand prior. PowerDNS Authoritative (\u0027pdns_server\u0027) is not affected. \n\nSOLUTION:\nUpdate to version 3.1.7.2. \nhttp://www.powerdns.com/en/downloads.aspx\n\nPROVIDED AND/OR DISCOVERED BY:\nThe vendor credits anonymous third parties. \n\nORIGINAL ADVISORY:\n1) http://doc.powerdns.com/powerdns-advisory-2010-01.html\n2) http://doc.powerdns.com/powerdns-advisory-2010-02.html\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\nprivate users keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/advisories/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/advisories/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\nGentoo Linux Security Advisory GLSA 201412-33\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n http://security.gentoo.org/\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\n Severity: High\n Title: PowerDNS Recursor: Multiple vulnerabilities\n Date: December 22, 2014\n Bugs: #299942, #404377, #514946, #531992\n ID: 201412-33\n\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\nSynopsis\n========\n\nMultiple vulnerabilities have been found in PowerDNS Recursor, the\nworst of which may allow execution of arbitrary code. \n\nBackground\n==========\n\nPowerDNS Recursor is a high-end, high-performance resolving name server\n\nAffected packages\n=================\n\n -------------------------------------------------------------------\n Package / Vulnerable / Unaffected\n -------------------------------------------------------------------\n 1 net-dns/pdns-recursor \u003c 3.6.1-r1 \u003e= 3.6.1-r1\n\nDescription\n===========\n\nMultiple vulnerabilities have been discovered in PowerDNS Recursor. \nPlease review the CVE identifiers and PowerDNS blog post referenced\nbelow for details. \n\nImpact\n======\n\nA remote attacker may be able to send specially crafted packets,\npossibly resulting in arbitrary code execution or a Denial of Service\ncondition. \n\nWorkaround\n==========\n\nThere is no known workaround at this time. \n\nResolution\n==========\n\nAll PowerDNS Recursor users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose \"\u003e=net-dns/pdns-recursor-3.6.1-r1\"=\n\n\nReferences\n==========\n\n[ 1 ] CVE-2009-4009\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4009\n[ 2 ] CVE-2009-4010\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4010\n[ 3 ] CVE-2012-1193\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1193\n[ 4 ] CVE-2014-8601\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8601\n[ 5 ] Related to recent DoS attacks: Recursor configuration file\n guidance\n\nhttp://blog.powerdns.com/2014/02/06/related-to-recent-dos-attacks-recurso=\nr-configuration-file-guidance/\n\nAvailability\n============\n\nThis GLSA and any updates to it are available for viewing at\nthe Gentoo Security Website:\n\n http://security.gentoo.org/glsa/glsa-201412-33.xml\n\nConcerns?\n=========\n\nSecurity is a primary focus of Gentoo Linux and ensuring the\nconfidentiality and security of our users\u0027 machines is of utmost\nimportance to us. Any security concerns should be addressed to\nsecurity@gentoo.org or alternatively, you may file a bug at\nhttps://bugs.gentoo.org. \n\nLicense\n=======\n\nCopyright 2014 Gentoo Foundation, Inc; referenced text\nbelongs to its owner(s). \n\nThe contents of this document are licensed under the\nCreative Commons - Attribution / Share Alike license. \n\nhttp://creativecommons.org/licenses/by-sa/2.5\n. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n- ------------------------------------------------------------------------\nDebian Security Advisory DSA-1968-1 security@debian.org\nhttp://www.debian.org/security/ Florian Weimer\nJanuary 08, 2010 http://www.debian.org/security/faq\n- ------------------------------------------------------------------------\n\nPackage : pdns-recursor\nVulnerability : several\nProblem type : remote\nDebian-specific: no\nCVE Id(s) : CVE-2009-4009 CVE-2009-4010\n\nIt was discovered that pdns-recursor, the PowerDNS recursive name\nserver, contains several vulnerabilities:\n\nA buffer overflow can be exploited to crash the daemon, or potentially\nexecute arbitrary code (CVE-2009-4009). \n\nFor the old stable distribution (etch), fixed packages will be\nprovided soon. \n\nFor the stable distribution (lenny), these problems have been fixed in\nversion 3.1.7-1+lenny1. \n\nFor the unstable distribution (sid), these problems have been fixed in\nversion 3.1.7.2-1. \n\nWe recommend that you upgrade your pdns-recursor package. \n\nUpgrade instructions\n- --------------------\n\nwget url\n will fetch the file for you\ndpkg -i file.deb\n will install the referenced file. \n\nIf you are using the apt-get package manager, use the line for\nsources.list as given below:\n\napt-get update\n will update the internal database\napt-get upgrade\n will install corrected packages\n\nYou may use an automated update by adding the resources from the\nfooter to the proper configuration. \n\n\nDebian GNU/Linux 5.0 alias lenny\n- --------------------------------\n\nSource archives:\n\n http://security.debian.org/pool/updates/main/p/pdns-recursor/pdns-recursor_3.1.7.orig.tar.gz\n Size/MD5 checksum: 211760 38c58fef666685d6756da97baf9b4d51\n http://security.debian.org/pool/updates/main/p/pdns-recursor/pdns-recursor_3.1.7-1+lenny1.dsc\n Size/MD5 checksum: 1654 fff9beb43eec355ca42d93d53c1ce299\n http://security.debian.org/pool/updates/main/p/pdns-recursor/pdns-recursor_3.1.7-1+lenny1.diff.gz\n Size/MD5 checksum: 14769 8794fecd11f1b014592e2a36d40aaaf6\n\nalpha architecture (DEC Alpha)\n\n http://security.debian.org/pool/updates/main/p/pdns-recursor/pdns-recursor_3.1.7-1+lenny1_alpha.deb\n Size/MD5 checksum: 545726 dc05fab76c0fcb051b9a428cfa126061\n\namd64 architecture (AMD x86_64 (AMD64))\n\n http://security.debian.org/pool/updates/main/p/pdns-recursor/pdns-recursor_3.1.7-1+lenny1_amd64.deb\n Size/MD5 checksum: 440822 365fc4da2fd1770f8e62f1a3a0046231\n\ni386 architecture (Intel ia32)\n\n http://security.debian.org/pool/updates/main/p/pdns-recursor/pdns-recursor_3.1.7-1+lenny1_i386.deb\n Size/MD5 checksum: 440686 ac26d27658892619ce539921796bce67\n\nia64 architecture (Intel ia64)\n\n http://security.debian.org/pool/updates/main/p/pdns-recursor/pdns-recursor_3.1.7-1+lenny1_ia64.deb\n Size/MD5 checksum: 631308 f80c2d28ee6d9ebdbf6cad177c8fbddd\n\npowerpc architecture (PowerPC)\n\n http://security.debian.org/pool/updates/main/p/pdns-recursor/pdns-recursor_3.1.7-1+lenny1_powerpc.deb\n Size/MD5 checksum: 463434 f0bba833d4231bb2237433373e888a12\n\ns390 architecture (IBM S/390)\n\n http://security.debian.org/pool/updates/main/p/pdns-recursor/pdns-recursor_3.1.7-1+lenny1_s390.deb\n Size/MD5 checksum: 428138 994a5190fa0f73b49252bee0a695fb4d\n\n\n These files will probably be moved into the stable distribution on\n its next update. \n\n- ---------------------------------------------------------------------------------\nFor apt-get: deb http://security.debian.org/ stable/updates main\nFor dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main\nMailing list: debian-security-announce@lists.debian.org\nPackage info: `apt-cache show \u003cpkg\u003e\u0027 and http://packages.debian.org/\u003cpkg\u003e\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.4.9 (GNU/Linux)\n\niQEcBAEBAgAGBQJLR6jtAAoJEL97/wQC1SS+RxkH/0esg7lQO3qDCRJw32DPNjI0\nzlHI6Z6jvWyhYnitqfrzuXdgU18Nq5txdLvJlllQOtxVOnwXAaVOSHCELc0c4i2D\nDC0JLWGm43n6RBxEteJsx83xN5yucVg4c7KvSjDM2lHkcOnXL+Z6Qz93pFgoL9wF\nx6uBdBBV3+YqrvHvl8hV0fHQPyMYvE6x2sJ5eBm6bluXCPgNYviFtiCTx1HUUTBn\ncsGvkDSX81vFe07AKWr41ZiC0p5vesyJC4V6ljB2l9UWPLGT1pKZSuByfdNYMgvV\nguGTqguJzcjaoQ8Cn619Rmqn513N8itRyIqb8gI9E+YmcizBIdLHDi4JSsD/ikA=\n=XCaJ\n-----END PGP SIGNATURE-----\n\n_______________________________________________\nFull-Disclosure - We believe in it. \nCharter: http://lists.grok.org.uk/full-disclosure-charter.html\nHosted and sponsored by Secunia - http://secunia.com/\n", "sources": [ { "db": "NVD", "id": "CVE-2009-4010" }, { "db": "JVNDB", "id": "JVNDB-2010-005035" }, { "db": "CNVD", "id": "CNVD-2010-5502" }, { "db": "BID", "id": "37653" }, { "db": "PACKETSTORM", "id": "85750" }, { "db": "PACKETSTORM", "id": "85262" }, { "db": "PACKETSTORM", "id": "85277" }, { "db": "PACKETSTORM", "id": "129691" }, { "db": "PACKETSTORM", "id": "84957" } ], "trust": 2.88 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2009-4010", "trust": 3.6 }, { "db": "BID", "id": "37653", "trust": 2.5 }, { "db": "SECUNIA", "id": "38068", "trust": 1.7 }, { "db": "SECUNIA", "id": "38004", "trust": 1.7 }, { "db": "VUPEN", "id": "ADV-2010-0054", "trust": 1.6 }, { "db": "SECTRACK", "id": "1023404", "trust": 1.6 }, { "db": "JVNDB", "id": "JVNDB-2010-005035", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2010-5502", "trust": 0.6 }, { "db": "XF", "id": "55439", "trust": 0.6 }, { "db": "NSFOCUS", "id": "14304", "trust": 0.6 }, { "db": "FEDORA", "id": "FEDORA-2010-0209", "trust": 0.6 }, { "db": "FEDORA", "id": "FEDORA-2010-0228", "trust": 0.6 }, { "db": "BUGTRAQ", "id": "20100106 CRITICAL POWERDNS RECURSOR SECURITY VULNERABILITIES: PLEASE UPGRADE ASAP TO 3.1.7.2", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-201001-052", "trust": 0.6 }, { "db": "PACKETSTORM", "id": "85750", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "85262", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "85277", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "129691", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "84957", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2010-5502" }, { "db": "BID", "id": "37653" }, { "db": "JVNDB", "id": "JVNDB-2010-005035" }, { "db": "PACKETSTORM", "id": "85750" }, { "db": "PACKETSTORM", "id": "85262" }, { "db": "PACKETSTORM", "id": "85277" }, { "db": "PACKETSTORM", "id": "129691" }, { "db": "PACKETSTORM", "id": "84957" }, { "db": "NVD", "id": "CVE-2009-4010" }, { "db": "CNNVD", "id": "CNNVD-201001-052" } ] }, "id": "VAR-201001-0677", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2010-5502" } ], "trust": 0.06 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2010-5502" } ] }, "last_update_date": "2023-12-18T11:05:09.662000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "PowerDNS Security Advisory 2010-02", "trust": 0.8, "url": "http://doc.powerdns.com/powerdns-advisory-2010-02.html" }, { "title": "PowerDNS Recursor Remote Cache Patch for Vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/37391" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2010-5502" }, { "db": "JVNDB", "id": "JVNDB-2010-005035" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2009-4010" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.2, "url": "http://www.securityfocus.com/bid/37653" }, { "trust": 2.0, "url": "http://doc.powerdns.com/powerdns-advisory-2010-02.html" }, { "trust": 1.7, "url": "https://www.redhat.com/archives/fedora-package-announce/2010-january/msg00228.html" }, { "trust": 1.7, "url": "https://www.redhat.com/archives/fedora-package-announce/2010-january/msg00217.html" }, { "trust": 1.6, "url": "http://secunia.com/advisories/38004" }, { "trust": 1.6, "url": "http://secunia.com/advisories/38068" }, { "trust": 1.6, "url": "http://securitytracker.com/id?1023404" }, { "trust": 1.6, "url": "http://www.vupen.com/english/advisories/2010/0054" }, { "trust": 1.6, "url": "https://bugzilla.redhat.com/show_bug.cgi?id=552285" }, { "trust": 1.0, "url": "http://www.securityfocus.com/archive/1/508743/100/0/threaded" }, { "trust": 1.0, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/55439" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-4010" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2009-4010" }, { "trust": 0.6, "url": "http://xforce.iss.net/xforce/xfdb/55439" }, { "trust": 0.6, "url": "http://www.securityfocus.com/archive/1/archive/1/508743/100/0/threaded" }, { "trust": 0.6, "url": "http://www.nsfocus.net/vulndb/14304" }, { "trust": 0.3, "url": "http://www.powerdns.com/" }, { "trust": 0.3, "url": "/archive/1/508743" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2009-4010" }, { "trust": 0.2, "url": "http://packages.debian.org/\u003cpkg\u003e" }, { "trust": 0.2, "url": "http://security.debian.org/" }, { "trust": 0.2, "url": "http://www.debian.org/security/faq" }, { "trust": 0.2, "url": "http://www.debian.org/security/" }, { "trust": 0.2, "url": "http://secunia.com/advisories/secunia_security_advisories/" }, { "trust": 0.2, "url": "http://secunia.com/advisories/38004/" }, { "trust": 0.2, "url": "http://secunia.com/vulnerability_scanning/" }, { "trust": 0.2, "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org" }, { "trust": 0.2, "url": "http://secunia.com/advisories/about_secunia_advisories/" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2009-4009" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/pdns-recursor/pdns-recursor_3.1.4+v3.1.7-0+etch1_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/pdns-recursor/pdns-recursor_3.1.4+v3.1.7-0+etch1_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/pdns-recursor/pdns-recursor_3.1.4+v3.1.7-0+etch1_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/pdns-recursor/pdns-recursor_3.1.4+v3.1.7-0+etch1_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/pdns-recursor/pdns-recursor_3.1.4+v3.1.7-0+etch1_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/pdns-recursor/pdns-recursor_3.1.4+v3.1.7.orig.tar.gz" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/pdns-recursor/pdns-recursor_3.1.4+v3.1.7-0+etch1.diff.gz" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/pdns-recursor/pdns-recursor_3.1.4+v3.1.7-0+etch1.dsc" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/pdns-recursor/pdns-recursor_3.1.4+v3.1.7-0+etch1_amd64.deb" }, { "trust": 0.1, "url": "http://secunia.com/advisories/38068/" }, { "trust": 0.1, "url": "http://doc.powerdns.com/powerdns-advisory-2010-01.html" }, { "trust": 0.1, "url": "http://www.powerdns.com/en/downloads.aspx" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-4009" }, { "trust": 0.1, "url": "http://creativecommons.org/licenses/by-sa/2.5" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1193" }, { "trust": 0.1, "url": "http://security.gentoo.org/glsa/glsa-201412-33.xml" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-1193" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-8601" }, { "trust": 0.1, "url": "http://security.gentoo.org/" }, { "trust": 0.1, "url": "http://blog.powerdns.com/2014/02/06/related-to-recent-dos-attacks-recurso=" }, { "trust": 0.1, "url": "https://bugs.gentoo.org." }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-4010" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-8601" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/pdns-recursor/pdns-recursor_3.1.7.orig.tar.gz" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/pdns-recursor/pdns-recursor_3.1.7-1+lenny1_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/pdns-recursor/pdns-recursor_3.1.7-1+lenny1_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/pdns-recursor/pdns-recursor_3.1.7-1+lenny1_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/pdns-recursor/pdns-recursor_3.1.7-1+lenny1_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/pdns-recursor/pdns-recursor_3.1.7-1+lenny1.dsc" }, { "trust": 0.1, "url": "http://secunia.com/" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/pdns-recursor/pdns-recursor_3.1.7-1+lenny1_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/pdns-recursor/pdns-recursor_3.1.7-1+lenny1.diff.gz" }, { "trust": 0.1, "url": "http://lists.grok.org.uk/full-disclosure-charter.html" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/p/pdns-recursor/pdns-recursor_3.1.7-1+lenny1_i386.deb" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2010-5502" }, { "db": "BID", "id": "37653" }, { "db": "JVNDB", "id": "JVNDB-2010-005035" }, { "db": "PACKETSTORM", "id": "85750" }, { "db": "PACKETSTORM", "id": "85262" }, { "db": "PACKETSTORM", "id": "85277" }, { "db": "PACKETSTORM", "id": "129691" }, { "db": "PACKETSTORM", "id": "84957" }, { "db": "NVD", "id": "CVE-2009-4010" }, { "db": "CNNVD", "id": "CNNVD-201001-052" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2010-5502" }, { "db": "BID", "id": "37653" }, { "db": "JVNDB", "id": "JVNDB-2010-005035" }, { "db": "PACKETSTORM", "id": "85750" }, { "db": "PACKETSTORM", "id": "85262" }, { "db": "PACKETSTORM", "id": "85277" }, { "db": "PACKETSTORM", "id": "129691" }, { "db": "PACKETSTORM", "id": "84957" }, { "db": "NVD", "id": "CVE-2009-4010" }, { "db": "CNNVD", "id": "CNNVD-201001-052" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2010-01-08T00:00:00", "db": "CNVD", "id": "CNVD-2010-5502" }, { "date": "2010-01-06T00:00:00", "db": "BID", "id": "37653" }, { "date": "2012-12-20T00:00:00", "db": "JVNDB", "id": "JVNDB-2010-005035" }, { "date": "2010-01-29T23:33:09", "db": "PACKETSTORM", "id": "85750" }, { "date": "2010-01-17T12:52:23", "db": "PACKETSTORM", "id": "85262" }, { "date": "2010-01-17T15:18:58", "db": "PACKETSTORM", "id": "85277" }, { "date": "2014-12-23T15:40:47", "db": "PACKETSTORM", "id": "129691" }, { "date": "2010-01-09T01:45:26", "db": "PACKETSTORM", "id": "84957" }, { "date": "2010-01-08T17:30:02.287000", "db": "NVD", "id": "CVE-2009-4010" }, { "date": "2010-01-08T00:00:00", "db": "CNNVD", "id": "CNNVD-201001-052" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2010-01-08T00:00:00", "db": "CNVD", "id": "CNVD-2010-5502" }, { "date": "2015-04-13T21:54:00", "db": "BID", "id": "37653" }, { "date": "2012-12-20T00:00:00", "db": "JVNDB", "id": "JVNDB-2010-005035" }, { "date": "2018-10-10T19:48:05.113000", "db": "NVD", "id": "CVE-2009-4010" }, { "date": "2010-01-11T00:00:00", "db": "CNNVD", "id": "CNNVD-201001-052" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201001-052" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "PowerDNS Recursor Remote Cache Poisoning Vulnerability", "sources": [ { "db": "CNVD", "id": "CNVD-2010-5502" }, { "db": "BID", "id": "37653" }, { "db": "CNNVD", "id": "CNNVD-201001-052" } ], "trust": 1.5 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "lack of information", "sources": [ { "db": "CNNVD", "id": "CNNVD-201001-052" } ], "trust": 0.6 } }