
CVE-2018-16855
https://notcve.org/view.php?id=CVE-2018-16855
03 Dec 2018 — An issue has been found in PowerDNS Recursor before version 4.1.8 where a remote attacker sending a DNS query can trigger an out-of-bounds memory read while computing the hash of the query for a packet cache lookup, possibly leading to a crash. Se ha detectado un problema en PowerDNS Recursor en versiones anteriores a la 4.1.8 en donde un atacante remoto que envíe una consulta DNS puede desencadenar una lectura de memoria fuera de límites cuando procesa el hash de la consulta para una búsqueda de memoria ca... • https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16855 • CWE-125: Out-of-bounds Read •

CVE-2018-14626 – Ubuntu Security Notice USN-7203-1
https://notcve.org/view.php?id=CVE-2018-14626
29 Nov 2018 — PowerDNS Authoritative Server 4.1.0 up to 4.1.4 inclusive and PowerDNS Recursor 4.0.0 up to 4.1.4 inclusive are vulnerable to a packet cache pollution via crafted query that can lead to denial of service. PowerDNS Authoritative Server desde la versión 4.1.0 hasta la 4.1.4 y PowerDNS Recursor desde la versión 4.0.0 hasta la 4.1.4, son vulnerables a una contaminación de memora caché de paquetes mediante una consulta manipulada que puede provocar una denegación de servicio (DoS). Wei Hao discovered that PowerD... • https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14626 • CWE-400: Uncontrolled Resource Consumption •

CVE-2018-10851 – Ubuntu Security Notice USN-7203-1
https://notcve.org/view.php?id=CVE-2018-10851
29 Nov 2018 — PowerDNS Authoritative Server 3.3.0 up to 4.1.4 excluding 4.1.5 and 4.0.6, and PowerDNS Recursor 3.2 up to 4.1.4 excluding 4.1.5 and 4.0.9, are vulnerable to a memory leak while parsing malformed records that can lead to remote denial of service. PowerDNS Authoritative Server desde la versión 3.3.0 hasta la 4.1.4 excluyendo las versiones 4.1.5 y 4.0.6, y PowerDNS Recursor desde la versión 3.2 hasta la 4.1.4 excluyendo las versiones 4.1.5 y 4.0.9, son vulnerables a una fuga de memoria cuando se analizan regi... • https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10851 • CWE-400: Uncontrolled Resource Consumption CWE-772: Missing Release of Resource after Effective Lifetime •

CVE-2018-14644 – Ubuntu Security Notice USN-7203-1
https://notcve.org/view.php?id=CVE-2018-14644
09 Nov 2018 — An issue has been found in PowerDNS Recursor from 4.0.0 up to and including 4.1.4. A remote attacker sending a DNS query for a meta-type like OPT can lead to a zone being wrongly cached as failing DNSSEC validation. It only arises if the parent zone is signed, and all the authoritative servers for that parent zone answer with FORMERR to a query for at least one of the meta-types. As a result, subsequent queries from clients requesting DNSSEC validation will be answered with a ServFail. Se ha encontrado un p... • https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14644 • CWE-20: Improper Input Validation •

CVE-2017-15120
https://notcve.org/view.php?id=CVE-2017-15120
27 Jul 2018 — An issue has been found in the parsing of authoritative answers in PowerDNS Recursor before 4.0.8, leading to a NULL pointer dereference when parsing a specially crafted answer containing a CNAME of a different class than IN. An unauthenticated remote attacker could cause a denial of service. Se ha encontrado un problema en el análisis de respuestas autorizadas en PowerDNS Recursor en versiones anteriores a la 4.0.8, lo que conduce a una desreferencia de puntero NULL al analizar una respuesta especialmente ... • https://github.com/shutingrz/CVE-2017-15120_PoC • CWE-476: NULL Pointer Dereference •

CVE-2017-15090
https://notcve.org/view.php?id=CVE-2017-15090
23 Jan 2018 — An issue has been found in the DNSSEC validation component of PowerDNS Recursor from 4.0.0 and up to and including 4.0.6, where the signatures might have been accepted as valid even if the signed data was not in bailiwick of the DNSKEY used to sign it. This allows an attacker in position of man-in-the-middle to alter the content of records by issuing a valid signature for the crafted records. Se ha descubierto un problema en el componente de validación DNSSEC de PowerDNS Recursor, desde la versión 4.0.0 has... • http://www.securityfocus.com/bid/101982 • CWE-347: Improper Verification of Cryptographic Signature •

CVE-2017-15092
https://notcve.org/view.php?id=CVE-2017-15092
23 Jan 2018 — A cross-site scripting issue has been found in the web interface of PowerDNS Recursor from 4.0.0 up to and including 4.0.6, where the qname of DNS queries was displayed without any escaping, allowing a remote attacker to inject HTML and Javascript code into the web interface, altering the content. Se ha encontrado un problema de Cross-Site Scripting (XSS) en la interfaz web de PowerDNS Recursor, desde la versión 4.0.0 hasta la versión 4.0.6, también incluida, en la que el qname de las consultas DNS se mostr... • http://www.securityfocus.com/bid/101982 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2017-15093
https://notcve.org/view.php?id=CVE-2017-15093
23 Jan 2018 — When api-config-dir is set to a non-empty value, which is not the case by default, the API in PowerDNS Recursor 4.x up to and including 4.0.6 and 3.x up to and including 3.7.4 allows an authorized user to update the Recursor's ACL by adding and removing netmasks, and to configure forward zones. It was discovered that the new netmask and IP addresses of forwarded zones were not sufficiently validated, allowing an authenticated user to inject new configuration directives into the Recursor's configuration. Cua... • http://www.securityfocus.com/bid/101982 • CWE-20: Improper Input Validation •

CVE-2017-15094
https://notcve.org/view.php?id=CVE-2017-15094
23 Jan 2018 — An issue has been found in the DNSSEC parsing code of PowerDNS Recursor from 4.0.0 up to and including 4.0.6 leading to a memory leak when parsing specially crafted DNSSEC ECDSA keys. These keys are only parsed when validation is enabled by setting dnssec to a value other than off or process-no-validate (default). Se ha encontrado un problema en el código de análisis DNSSEC de PowerDNS Recursor, desde la versión 4.0.0 hasta la 4.0.6, también incluida, lo que conduce a una fuga de memoria al analizar claves ... • http://www.securityfocus.com/bid/101982 • CWE-401: Missing Release of Memory after Effective Lifetime CWE-772: Missing Release of Resource after Effective Lifetime •

CVE-2018-1000003
https://notcve.org/view.php?id=CVE-2018-1000003
22 Jan 2018 — Improper input validation bugs in DNSSEC validators components in PowerDNS version 4.1.0 allow attacker in man-in-the-middle position to deny existence of some data in DNS via packet replay. Errores de validación indebida de entradas en los componentes de validadores DNSSEC en PowerDNS 4.1.0 permiten que un atacante Man-in-the-Middle (MitM) niegue la existencia de algunos datos en DNS mediante la reproducción de paquetes. • https://doc.powerdns.com/recursor/security-advisories/powerdns-advisory-2018-01.html • CWE-20: Improper Input Validation •