WID-SEC-W-2026-1625
Vulnerability from csaf_certbund - Published: 2026-05-20 22:00 - Updated: 2026-05-21 22:00Summary
PowerDNS Authoritative Server: Mehrere Schwachstellen
Severity
Mittel
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung: Der Domain Name Service (DNS) ermöglicht die Umsetzung der Domainnamen in IP-Adressen. Zur Verhinderung von übermäßigen Anfragen werden die Zuordnungen häufig lokal in einem Cache gespeichert.
Angriff: Ein Angreifer kann mehrere Schwachstellen in PowerDNS Authoritative Server ausnutzen, um Informationen offenzulegen, Daten zu manipulieren und einen Denial-of-Service-Zustand zu verursachen.
Betroffene Betriebssysteme: - Sonstiges
- UNIX
Affected products
Known affected
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source PowerDNS Authoritative Server <5.0.5
Open Source / PowerDNS
|
Authoritative Server <5.0.5 | ||
|
Open Source PowerDNS Authoritative Server <4.9.15
Open Source / PowerDNS
|
Authoritative Server <4.9.15 | ||
|
Fedora Linux
Fedora
|
cpe:/o:fedoraproject:fedora:-
|
— |
Affected products
Known affected
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source PowerDNS Authoritative Server <5.0.5
Open Source / PowerDNS
|
Authoritative Server <5.0.5 | ||
|
Open Source PowerDNS Authoritative Server <4.9.15
Open Source / PowerDNS
|
Authoritative Server <4.9.15 | ||
|
Fedora Linux
Fedora
|
cpe:/o:fedoraproject:fedora:-
|
— |
Affected products
Known affected
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source PowerDNS Authoritative Server <5.0.5
Open Source / PowerDNS
|
Authoritative Server <5.0.5 | ||
|
Open Source PowerDNS Authoritative Server <4.9.15
Open Source / PowerDNS
|
Authoritative Server <4.9.15 | ||
|
Fedora Linux
Fedora
|
cpe:/o:fedoraproject:fedora:-
|
— |
Affected products
Known affected
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source PowerDNS Authoritative Server <5.0.5
Open Source / PowerDNS
|
Authoritative Server <5.0.5 | ||
|
Open Source PowerDNS Authoritative Server <4.9.15
Open Source / PowerDNS
|
Authoritative Server <4.9.15 | ||
|
Fedora Linux
Fedora
|
cpe:/o:fedoraproject:fedora:-
|
— |
Affected products
Known affected
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source PowerDNS Authoritative Server <5.0.5
Open Source / PowerDNS
|
Authoritative Server <5.0.5 | ||
|
Open Source PowerDNS Authoritative Server <4.9.15
Open Source / PowerDNS
|
Authoritative Server <4.9.15 | ||
|
Fedora Linux
Fedora
|
cpe:/o:fedoraproject:fedora:-
|
— |
References
7 references
{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Der Domain Name Service (DNS) erm\u00f6glicht die Umsetzung der Domainnamen in IP-Adressen. Zur Verhinderung von \u00fcberm\u00e4\u00dfigen Anfragen werden die Zuordnungen h\u00e4ufig lokal in einem Cache gespeichert.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer kann mehrere Schwachstellen in PowerDNS Authoritative Server ausnutzen, um Informationen offenzulegen, Daten zu manipulieren und einen Denial-of-Service-Zustand zu verursachen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Sonstiges\n- UNIX",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2026-1625 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2026/wid-sec-w-2026-1625.json"
},
{
"category": "self",
"summary": "WID-SEC-2026-1625 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1625"
},
{
"category": "external",
"summary": "PowerDNS Security Advisory vom 2026-05-20",
"url": "https://blog.powerdns.com/2026/05/20/powerdns-security-advisory-2026-06-for-powerdns-authoritative-server"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-EPEL-2026-86E966DCA4 vom 2026-05-21",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2026-86e966dca4"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-2026-A6E5B1263B vom 2026-05-21",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-2026-a6e5b1263b"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-EPEL-2026-533C3439BA vom 2026-05-21",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2026-533c3439ba"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-2026-6458693037 vom 2026-05-21",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-2026-6458693037"
}
],
"source_lang": "en-US",
"title": "PowerDNS Authoritative Server: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2026-05-21T22:00:00.000+00:00",
"generator": {
"date": "2026-05-22T06:50:37.114+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.6.0"
}
},
"id": "WID-SEC-W-2026-1625",
"initial_release_date": "2026-05-20T22:00:00.000+00:00",
"revision_history": [
{
"date": "2026-05-20T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2026-05-21T22:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Fedora und European Union Vulnerability Database aufgenommen"
}
],
"status": "final",
"version": "2"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Fedora Linux",
"product": {
"name": "Fedora Linux",
"product_id": "74185",
"product_identification_helper": {
"cpe": "cpe:/o:fedoraproject:fedora:-"
}
}
}
],
"category": "vendor",
"name": "Fedora"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "Authoritative Server \u003c4.9.15",
"product": {
"name": "Open Source PowerDNS Authoritative Server \u003c4.9.15",
"product_id": "T054447"
}
},
{
"category": "product_version",
"name": "Authoritative Server 4.9.15",
"product": {
"name": "Open Source PowerDNS Authoritative Server 4.9.15",
"product_id": "T054447-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:powerdns:recursor:authoritative_server__4.9.15"
}
}
},
{
"category": "product_version_range",
"name": "Authoritative Server \u003c5.0.5",
"product": {
"name": "Open Source PowerDNS Authoritative Server \u003c5.0.5",
"product_id": "T054448"
}
},
{
"category": "product_version",
"name": "Authoritative Server 5.0.5",
"product": {
"name": "Open Source PowerDNS Authoritative Server 5.0.5",
"product_id": "T054448-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:powerdns:recursor:authoritative_server__5.0.5"
}
}
}
],
"category": "product_name",
"name": "PowerDNS"
}
],
"category": "vendor",
"name": "Open Source"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-41999",
"product_status": {
"known_affected": [
"T054448",
"T054447",
"74185"
]
},
"release_date": "2026-05-20T22:00:00.000+00:00",
"title": "CVE-2026-41999"
},
{
"cve": "CVE-2026-42000",
"product_status": {
"known_affected": [
"T054448",
"T054447",
"74185"
]
},
"release_date": "2026-05-20T22:00:00.000+00:00",
"title": "CVE-2026-42000"
},
{
"cve": "CVE-2026-42001",
"product_status": {
"known_affected": [
"T054448",
"T054447",
"74185"
]
},
"release_date": "2026-05-20T22:00:00.000+00:00",
"title": "CVE-2026-42001"
},
{
"cve": "CVE-2026-42002",
"product_status": {
"known_affected": [
"T054448",
"T054447",
"74185"
]
},
"release_date": "2026-05-20T22:00:00.000+00:00",
"title": "CVE-2026-42002"
},
{
"cve": "CVE-2026-42396",
"product_status": {
"known_affected": [
"T054448",
"T054447",
"74185"
]
},
"release_date": "2026-05-20T22:00:00.000+00:00",
"title": "CVE-2026-42396"
}
]
}
Loading…
Loading…
Experimental. This forecast is provided for visualization only and may change without notice. Do not use it for operational decisions.
Forecast uses a logistic model when the trend is rising, or an exponential decay model when the trend is falling. Fitted via linearized least squares.
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…