ALT-PU-2020-1407-1
Closed vulnerabilities
BDU:2019-01943
Уязвимость компонента «Authoritative Server» DNS-сервера PowerDNS, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-03644
Уязвимость функции синтаксического анализа DNS-сервера PowerDNS, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-03645
Уязвимость DNS-сервера PowerDNS, связанная с неконтролируемым расходом ресурсов, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2017-15091
An issue has been found in the API component of PowerDNS Authoritative 4.x up to and including 4.0.4 and 3.x up to and including 3.4.11, where some operations that have an impact on the state of the server are still allowed even though the API has been configured as read-only via the api-readonly keyword. This missing check allows an attacker with valid API credentials to flush the cache, trigger a zone transfer or send a NOTIFY.
Modified: 2024-11-21
CVE-2018-1046
pdns before version 4.1.2 is vulnerable to a buffer overflow in dnsreplay. In the dnsreplay tool provided with PowerDNS Authoritative, replaying a specially crafted PCAP file can trigger a stack-based buffer overflow, leading to a crash and potentially arbitrary code execution. This buffer overflow only occurs when the -ecs-stamp option of dnsreplay is used.
Modified: 2024-11-21
CVE-2018-10851
PowerDNS Authoritative Server 3.3.0 up to 4.1.4 excluding 4.1.5 and 4.0.6, and PowerDNS Recursor 3.2 up to 4.1.4 excluding 4.1.5 and 4.0.9, are vulnerable to a memory leak while parsing malformed records that can lead to remote denial of service.
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10851
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10851
- https://doc.powerdns.com/authoritative/security-advisories/powerdns-advisory-2018-03.html
- https://doc.powerdns.com/authoritative/security-advisories/powerdns-advisory-2018-03.html
- https://doc.powerdns.com/recursor/security-advisories/powerdns-advisory-2018-04.html
- https://doc.powerdns.com/recursor/security-advisories/powerdns-advisory-2018-04.html
Modified: 2024-11-21
CVE-2018-14626
PowerDNS Authoritative Server 4.1.0 up to 4.1.4 inclusive and PowerDNS Recursor 4.0.0 up to 4.1.4 inclusive are vulnerable to a packet cache pollution via crafted query that can lead to denial of service.
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14626
- https://doc.powerdns.com/authoritative/security-advisories/powerdns-advisory-2018-05.html
- https://doc.powerdns.com/recursor/security-advisories/powerdns-advisory-2018-06.html
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14626
- https://doc.powerdns.com/recursor/security-advisories/powerdns-advisory-2018-06.html
- https://doc.powerdns.com/authoritative/security-advisories/powerdns-advisory-2018-05.html
Modified: 2024-11-21
CVE-2019-10162
A vulnerability has been found in PowerDNS Authoritative Server before versions 4.1.10, 4.0.8 allowing an authorized user to cause the server to exit by inserting a crafted record in a MASTER type zone under their control. The issue is due to the fact that the Authoritative Server will exit when it runs into a parsing error while looking up the NS/A/AAAA records it is about to use for an outgoing notify.
- openSUSE-SU-2019:1904
- openSUSE-SU-2019:1904
- openSUSE-SU-2019:1921
- openSUSE-SU-2019:1921
- https://blog.powerdns.com/2019/06/21/powerdns-authoritative-server-4-0-8-and-4-1-10-released/
- https://blog.powerdns.com/2019/06/21/powerdns-authoritative-server-4-0-8-and-4-1-10-released/
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10162
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10162
- https://doc.powerdns.com/authoritative/security-advisories/powerdns-advisory-2019-04.html
- https://doc.powerdns.com/authoritative/security-advisories/powerdns-advisory-2019-04.html
Modified: 2024-11-21
CVE-2019-10163
A Vulnerability has been found in PowerDNS Authoritative Server before versions 4.1.9, 4.0.8 allowing a remote, authorized master server to cause a high CPU load or even prevent any further updates to any slave zone by sending a large number of NOTIFY messages. Note that only servers configured as slaves are affected by this issue.
- openSUSE-SU-2019:1904
- openSUSE-SU-2019:1904
- openSUSE-SU-2019:1921
- openSUSE-SU-2019:1921
- https://blog.powerdns.com/2019/06/21/powerdns-authoritative-server-4-0-8-and-4-1-10-released/
- https://blog.powerdns.com/2019/06/21/powerdns-authoritative-server-4-0-8-and-4-1-10-released/
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10163
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10163
- https://doc.powerdns.com/authoritative/security-advisories/powerdns-advisory-2019-05.html
- https://doc.powerdns.com/authoritative/security-advisories/powerdns-advisory-2019-05.html
Modified: 2024-11-21
CVE-2019-3871
A vulnerability was found in PowerDNS Authoritative Server before 4.0.7 and before 4.1.7. An insufficient validation of data coming from the user when building a HTTP request from a DNS query in the HTTP Connector of the Remote backend, allowing a remote user to cause a denial of service by making the server connect to an invalid endpoint, or possibly information disclosure by making the server connect to an internal endpoint and somehow extracting meaningful information about the response
- openSUSE-SU-2019:1128
- openSUSE-SU-2019:1128
- [oss-security] 20190318 PowerDNS Security Advisory 2019-03
- [oss-security] 20190318 PowerDNS Security Advisory 2019-03
- 107491
- 107491
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3871
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3871
- https://doc.powerdns.com/authoritative/security-advisories/powerdns-advisory-2019-03.html
- https://doc.powerdns.com/authoritative/security-advisories/powerdns-advisory-2019-03.html
- [debian-lts-announce] 20190329 [SECURITY] [DLA 1737-1] pdns security update
- [debian-lts-announce] 20190329 [SECURITY] [DLA 1737-1] pdns security update
- FEDORA-2019-b85d4171d4
- FEDORA-2019-b85d4171d4
- FEDORA-2019-9993d32c48
- FEDORA-2019-9993d32c48
- 20190404 [SECURITY] [DSA 4424-1] pdns security update
- 20190404 [SECURITY] [DSA 4424-1] pdns security update
- DSA-4424
- DSA-4424