CERTA-2012-AVI-016

Vulnerability from certfr_avis - Published: - Updated:

Un attaquant peut réaliser un déni de service à distance à l'aide de paquets UDP spécialement conçus.

Description

Une erreur dans le traitement des paquets « réponse DNS » par PowerDNS permet à un attaquant, au moyen de paquets UDP spécialement conçus, d'épuiser les ressources systèmes en forçant le serveur à répondre en boucle à ses propres réponses.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
N/A N/A PowerDNS Authoritative Server versions 3.x inférieures à la 3.0.1.
N/A N/A PowerDNS Authoritative Server versions 2.x inférieures à la 2.9.22.5 ;

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "PowerDNS Authoritative Server versions 3.x inf\u00e9rieures \u00e0 la 3.0.1.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "N/A",
          "scada": false
        }
      }
    },
    {
      "description": "PowerDNS Authoritative Server versions 2.x inf\u00e9rieures \u00e0 la 2.9.22.5 ;",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "N/A",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Description\n\nUne erreur dans le traitement des paquets \u00ab r\u00e9ponse DNS \u00bb par PowerDNS\npermet \u00e0 un attaquant, au moyen de paquets UDP sp\u00e9cialement con\u00e7us,\nd\u0027\u00e9puiser les ressources syst\u00e8mes en for\u00e7ant le serveur \u00e0 r\u00e9pondre en\nboucle \u00e0 ses propres r\u00e9ponses.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2012-0206",
      "url": "https://www.cve.org/CVERecord?id=CVE-2012-0206"
    }
  ],
  "links": [
    {
      "title": "Bulletin de s\u00e9curit\u00e9 PowerDNS Authoritative Server du 10    janvier 2012 :",
      "url": "http://www.powerdns.com/news/powerdns-security-advisory-2012-01.html"
    }
  ],
  "reference": "CERTA-2012-AVI-016",
  "revisions": [
    {
      "description": "version initiale.",
      "revision_date": "2012-01-13T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    }
  ],
  "summary": "Un attaquant peut r\u00e9aliser un d\u00e9ni de service \u00e0 distance \u00e0 l\u0027aide de\npaquets UDP sp\u00e9cialement con\u00e7us.\n",
  "title": "Vuln\u00e9rabilit\u00e9 dans PowerDNS",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 PowerDNS Authoritative Server du 10 janvier 2012",
      "url": null
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…