
CVE-2020-12244 – Debian Security Advisory 4691-1
https://notcve.org/view.php?id=CVE-2020-12244
19 May 2020 — An issue has been found in PowerDNS Recursor 4.1.0 through 4.3.0 where records in the answer section of a NXDOMAIN response lacking an SOA were not properly validated in SyncRes::processAnswer, allowing an attacker to bypass DNSSEC validation. Se detectó un problema en PowerDNS Recursor versiones 4.1.0 hasta 4.3.0, donde los registros en la sección de respuestas de una respuesta NXDOMAIN que carece de SOA no fueron comprobados apropiadamente en las función SyncRes::processAnswer, permitiendo a un atacante o... • http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00052.html • CWE-347: Improper Verification of Cryptographic Signature •

CVE-2019-10203
https://notcve.org/view.php?id=CVE-2019-10203
22 Nov 2019 — PowerDNS Authoritative daemon , pdns versions 4.0.x before 4.0.9, 4.1.x before 4.1.11, exiting when encountering a serial between 2^31 and 2^32-1 while trying to notify a slave leads to DoS. Daemon autorizado de PowerDNS, pdns versiones 4.0.x anteriores a la versión 4.0.9, 4.1.x anteriores a 4.1.11, que se cierra cuando se encuentra una serie entre 2 ^ 31 y 2 ^ 32-1 al intentar notificar a un esclavo que conduce a DoS. • https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10203 • CWE-681: Incorrect Conversion between Numeric Types •

CVE-2019-10163 – Debian Security Advisory 4470-1
https://notcve.org/view.php?id=CVE-2019-10163
23 Jun 2019 — A Vulnerability has been found in PowerDNS Authoritative Server before versions 4.1.9, 4.0.8 allowing a remote, authorized master server to cause a high CPU load or even prevent any further updates to any slave zone by sending a large number of NOTIFY messages. Note that only servers configured as slaves are affected by this issue. Se ha detectado una vulnerabilidad en Authoritative Server de PowerDNS anterior a versiones 4.1.9, 4.0.8, que permite a un servidor maestro autorizado y remoto causar una alta ca... • http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00036.html • CWE-770: Allocation of Resources Without Limits or Throttling •

CVE-2019-10162 – Debian Security Advisory 4470-1
https://notcve.org/view.php?id=CVE-2019-10162
23 Jun 2019 — A vulnerability has been found in PowerDNS Authoritative Server before versions 4.1.10, 4.0.8 allowing an authorized user to cause the server to exit by inserting a crafted record in a MASTER type zone under their control. The issue is due to the fact that the Authoritative Server will exit when it runs into a parsing error while looking up the NS/A/AAAA records it is about to use for an outgoing notify. Se ha detectado una vulnerabilidad en Authoritative Server de PowerDNS anterior a versiones 4.1.10, 4.0.... • http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00036.html • CWE-400: Uncontrolled Resource Consumption •

CVE-2019-3871 – Debian Security Advisory 4424-1
https://notcve.org/view.php?id=CVE-2019-3871
21 Mar 2019 — A vulnerability was found in PowerDNS Authoritative Server before 4.0.7 and before 4.1.7. An insufficient validation of data coming from the user when building a HTTP request from a DNS query in the HTTP Connector of the Remote backend, allowing a remote user to cause a denial of service by making the server connect to an invalid endpoint, or possibly information disclosure by making the server connect to an internal endpoint and somehow extracting meaningful information about the response Se ha descubierto... • http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00022.html • CWE-20: Improper Input Validation •

CVE-2019-3807
https://notcve.org/view.php?id=CVE-2019-3807
29 Jan 2019 — An issue has been found in PowerDNS Recursor versions 4.1.x before 4.1.9 where records in the answer section of responses received from authoritative servers with the AA flag not set were not properly validated, allowing an attacker to bypass DNSSEC validation. Se ha encontrado un problema en PowerDNS Recursor, en versiones 4.1.x anteriores a la 4.1.9, en el que los registros en la sección "answers" de las respuestas recibidas desde servidores autoritativos sin el flag AA no se validaban correctamente, lo q... • https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3807 • CWE-295: Improper Certificate Validation CWE-345: Insufficient Verification of Data Authenticity •

CVE-2019-3806
https://notcve.org/view.php?id=CVE-2019-3806
29 Jan 2019 — An issue has been found in PowerDNS Recursor versions after 4.1.3 before 4.1.9 where Lua hooks are not properly applied to queries received over TCP in some specific combination of settings, possibly bypassing security policies enforced using Lua. Se ha encontrado un problema en PowerDNS Recursor, desde la versión 4.1.3 hasta la 4.1.9, en el que los enlaces de Lua no se aplican correctamente a las consultas recibidas por TCP en alguna combinación específica de opciones, pudiendo omitir las políticas de segu... • https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3806 • CWE-358: Improperly Implemented Security Check for Standard •

CVE-2018-16855
https://notcve.org/view.php?id=CVE-2018-16855
03 Dec 2018 — An issue has been found in PowerDNS Recursor before version 4.1.8 where a remote attacker sending a DNS query can trigger an out-of-bounds memory read while computing the hash of the query for a packet cache lookup, possibly leading to a crash. Se ha detectado un problema en PowerDNS Recursor en versiones anteriores a la 4.1.8 en donde un atacante remoto que envíe una consulta DNS puede desencadenar una lectura de memoria fuera de límites cuando procesa el hash de la consulta para una búsqueda de memoria ca... • https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16855 • CWE-125: Out-of-bounds Read •

CVE-2018-10851 – Ubuntu Security Notice USN-7203-1
https://notcve.org/view.php?id=CVE-2018-10851
29 Nov 2018 — PowerDNS Authoritative Server 3.3.0 up to 4.1.4 excluding 4.1.5 and 4.0.6, and PowerDNS Recursor 3.2 up to 4.1.4 excluding 4.1.5 and 4.0.9, are vulnerable to a memory leak while parsing malformed records that can lead to remote denial of service. PowerDNS Authoritative Server desde la versión 3.3.0 hasta la 4.1.4 excluyendo las versiones 4.1.5 y 4.0.6, y PowerDNS Recursor desde la versión 3.2 hasta la 4.1.4 excluyendo las versiones 4.1.5 y 4.0.9, son vulnerables a una fuga de memoria cuando se analizan regi... • https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10851 • CWE-400: Uncontrolled Resource Consumption CWE-772: Missing Release of Resource after Effective Lifetime •

CVE-2018-14626 – Ubuntu Security Notice USN-7203-1
https://notcve.org/view.php?id=CVE-2018-14626
29 Nov 2018 — PowerDNS Authoritative Server 4.1.0 up to 4.1.4 inclusive and PowerDNS Recursor 4.0.0 up to 4.1.4 inclusive are vulnerable to a packet cache pollution via crafted query that can lead to denial of service. PowerDNS Authoritative Server desde la versión 4.1.0 hasta la 4.1.4 y PowerDNS Recursor desde la versión 4.0.0 hasta la 4.1.4, son vulnerables a una contaminación de memora caché de paquetes mediante una consulta manipulada que puede provocar una denegación de servicio (DoS). Wei Hao discovered that PowerD... • https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14626 • CWE-400: Uncontrolled Resource Consumption •