Page 3 of 38 results (0.007 seconds)

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 0

An issue has been found in PowerDNS Recursor 4.1.0 up to and including 4.3.0. It allows an attacker (with enough privileges to change the system's hostname) to cause disclosure of uninitialized memory content via a stack-based out-of-bounds read. It only occurs on systems where gethostname() does not have '\0' termination of the returned string if the hostname is larger than the supplied buffer. (Linux systems are not affected because the buffer is always large enough. OpenBSD systems are not affected because the returned hostname always has '\0' termination.) • http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00052.html https://doc.powerdns.com/recursor/security-advisories/powerdns-advisory-2020-03.html https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NMP72NJGKBWR5WEBXAWX5KSLQUDFTG6S https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PS4ZN5XGENYNFKX7QIIOUCQQHXE37GJF • CWE-125: Out-of-bounds Read •

CVSS: 7.5EPSS: 0%CPEs: 6EXPL: 0

An issue has been found in PowerDNS Recursor 4.1.0 through 4.3.0 where records in the answer section of a NXDOMAIN response lacking an SOA were not properly validated in SyncRes::processAnswer, allowing an attacker to bypass DNSSEC validation. Se detectó un problema en PowerDNS Recursor versiones 4.1.0 hasta 4.3.0, donde los registros en la sección de respuestas de una respuesta NXDOMAIN que carece de SOA no fueron comprobados apropiadamente en las función SyncRes::processAnswer, permitiendo a un atacante omitir la comprobación DNSSEC. • http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00052.html http://www.openwall.com/lists/oss-security/2020/05/19/3 https://doc.powerdns.com/recursor/security-advisories/powerdns-advisory-2020-02.html https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NMP72NJGKBWR5WEBXAWX5KSLQUDFTG6S https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PS4ZN5XGENYNFKX7QIIOUCQQHXE37GJF https://www.debian.org/security/2020/dsa-4691 • CWE-347: Improper Verification of Cryptographic Signature •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 0

An issue has been found in PowerDNS Recursor versions 4.1.x before 4.1.9 where records in the answer section of responses received from authoritative servers with the AA flag not set were not properly validated, allowing an attacker to bypass DNSSEC validation. Se ha encontrado un problema en PowerDNS Recursor, en versiones 4.1.x anteriores a la 4.1.9, en el que los registros en la sección "answers" de las respuestas recibidas desde servidores autoritativos sin el flag AA no se validaban correctamente, lo que permite que un atacante omita la validación DNSSEC. • https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3807 https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2019-02.html • CWE-295: Improper Certificate Validation CWE-345: Insufficient Verification of Data Authenticity •

CVSS: 8.1EPSS: 0%CPEs: 1EXPL: 0

An issue has been found in PowerDNS Recursor versions after 4.1.3 before 4.1.9 where Lua hooks are not properly applied to queries received over TCP in some specific combination of settings, possibly bypassing security policies enforced using Lua. Se ha encontrado un problema en PowerDNS Recursor, desde la versión 4.1.3 hasta la 4.1.9, en el que los enlaces de Lua no se aplican correctamente a las consultas recibidas por TCP en alguna combinación específica de opciones, pudiendo omitir las políticas de seguridad aplicadas con Lua. • https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3806 https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2019-01.html • CWE-358: Improperly Implemented Security Check for Standard •

CVSS: 7.5EPSS: 46%CPEs: 1EXPL: 0

An issue has been found in PowerDNS Recursor before version 4.1.8 where a remote attacker sending a DNS query can trigger an out-of-bounds memory read while computing the hash of the query for a packet cache lookup, possibly leading to a crash. Se ha detectado un problema en PowerDNS Recursor en versiones anteriores a la 4.1.8 en donde un atacante remoto que envíe una consulta DNS puede desencadenar una lectura de memoria fuera de límites cuando procesa el hash de la consulta para una búsqueda de memoria caché de los paquetes, posiblemente conduciendo a a un cierre inesperado. • https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16855 https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2018-09.html • CWE-125: Out-of-bounds Read •