![](/assets/img/cve_300x82_sin_bg.png)
CVE-2009-4010 – Gentoo Linux Security Advisory 201412-33
https://notcve.org/view.php?id=CVE-2009-4010
08 Jan 2010 — Unspecified vulnerability in PowerDNS Recursor before 3.1.7.2 allows remote attackers to spoof DNS data via crafted zones. Vulnerabilidad sin especificar en PowerDNS Recursor anterior a v3.1.7.2 permite a atacantes remotos suplantar datos DNS a través de zonas manipuladas. Multiple vulnerabilities have been found in PowerDNS Recursor, the worst of which may allow execution of arbitrary code. Versions less than 3.6.1-r1 are affected. • http://doc.powerdns.com/powerdns-advisory-2010-02.html •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2009-4009 – Gentoo Linux Security Advisory 201412-33
https://notcve.org/view.php?id=CVE-2009-4009
08 Jan 2010 — Buffer overflow in PowerDNS Recursor before 3.1.7.2 allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via crafted packets. Desbordamiento de búfer en PowerDNS Recursor anterior a v3.1.7.2 permite a atacantes remotos provocar una denegación de servicio (caída del demonio) o posiblemente ejecutar código de su elección a través de paquetes manipulados. Multiple vulnerabilities have been found in PowerDNS Recursor, the worst of which may allow execution of ar... • http://doc.powerdns.com/powerdns-advisory-2010-01.html • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2008-3217
https://notcve.org/view.php?id=CVE-2008-3217
18 Jul 2008 — PowerDNS Recursor before 3.1.6 does not always use the strongest random number generator for source port selection, which makes it easier for remote attack vectors to conduct DNS cache poisoning. NOTE: this is related to incomplete integration of security improvements associated with addressing CVE-2008-1637. PowerDNS Recursor anterior a 3.1.6 no utiliza siempre el generador de números aleatorios más robusto para la selección de un puerto de origen, lo que le hace más fácil para los vectores de ataque remot... • http://doc.powerdns.com/changelog.html#CHANGELOG-RECURSOR-3-1-6 • CWE-189: Numeric Errors •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2008-1637
https://notcve.org/view.php?id=CVE-2008-1637
02 Apr 2008 — PowerDNS Recursor before 3.1.5 uses insufficient randomness to calculate (1) TRXID values and (2) UDP source port numbers, which makes it easier for remote attackers to poison a DNS cache, related to (a) algorithmic deficiencies in rand and random functions in external libraries, (b) use of a 32-bit seed value, and (c) choice of the time of day as the sole seeding information. PowerDNS Recursor anterior a 3.1.5 no emplea la suficiente aleatoriedad para calcular (1) los valores TRXID y (2) números de las fue... • http://doc.powerdns.com/changelog.html • CWE-189: Numeric Errors •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2006-4252
https://notcve.org/view.php?id=CVE-2006-4252
14 Nov 2006 — PowerDNS Recursor 3.1.3 and earlier allows remote attackers to cause a denial of service (resource exhaustion and application crash) via a CNAME record with a zero TTL, which triggers an infinite loop. PowerDNS Recursor 3.1.3 y anteriores permite a atacantes remotos provocar una denegación de servicio (agotamiento de recursos o caída de la aplicación) mediante un registro CNAME con un TTL a cero, lo cual dispara un bucle infinito. • http://doc.powerdns.com/powerdns-advisory-2006-02.html •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2006-4251
https://notcve.org/view.php?id=CVE-2006-4251
14 Nov 2006 — Buffer overflow in PowerDNS Recursor 3.1.3 and earlier might allow remote attackers to execute arbitrary code via a malformed TCP DNS query that prevents Recursor from properly calculating the TCP DNS query length. Desbordamiento de búfer en PowerDNS Recursor 3.1.3 y anteriores puede que permita a atacantes remotos ejecutar código de su elección mediante consultas TCP DNS mal formadas que previene a Recursor de calcular correctamente la longitud de una consulta TCP DNS. • http://doc.powerdns.com/powerdns-advisory-2006-01.html •