Page 4 of 72 results (0.002 seconds)

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 0

29 Nov 2018 — PowerDNS Authoritative Server 3.3.0 up to 4.1.4 excluding 4.1.5 and 4.0.6, and PowerDNS Recursor 3.2 up to 4.1.4 excluding 4.1.5 and 4.0.9, are vulnerable to a memory leak while parsing malformed records that can lead to remote denial of service. PowerDNS Authoritative Server desde la versión 3.3.0 hasta la 4.1.4 excluyendo las versiones 4.1.5 y 4.0.6, y PowerDNS Recursor desde la versión 3.2 hasta la 4.1.4 excluyendo las versiones 4.1.5 y 4.0.9, son vulnerables a una fuga de memoria cuando se analizan regi... • https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10851 • CWE-400: Uncontrolled Resource Consumption CWE-772: Missing Release of Resource after Effective Lifetime •

CVSS: 5.9EPSS: 0%CPEs: 1EXPL: 0

26 Nov 2018 — An issue has been found in PowerDNS DNSDist before 1.3.3 allowing a remote attacker to craft a DNS query with trailing data such that the addition of a record by dnsdist, for example an OPT record when adding EDNS Client Subnet, might result in the trailing data being smuggled to the backend as a valid record while not seen by dnsdist. This is an issue when dnsdist is deployed as a DNS Firewall and used to filter some records that should not be received by the backend. This issue occurs only when either the... • https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14663 • CWE-20: Improper Input Validation •

CVSS: 5.9EPSS: 0%CPEs: 1EXPL: 0

09 Nov 2018 — An issue has been found in PowerDNS Recursor from 4.0.0 up to and including 4.1.4. A remote attacker sending a DNS query for a meta-type like OPT can lead to a zone being wrongly cached as failing DNSSEC validation. It only arises if the parent zone is signed, and all the authoritative servers for that parent zone answer with FORMERR to a query for at least one of the meta-types. As a result, subsequent queries from clients requesting DNSSEC validation will be answered with a ServFail. Se ha encontrado un p... • https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14644 • CWE-20: Improper Input Validation •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

11 Sep 2018 — An issue has been found in dnsdist before 1.2.0 in the way EDNS0 OPT records are handled when parsing responses from a backend. When dnsdist is configured to add EDNS Client Subnet to a query, the response may contain an EDNS0 OPT record that has to be removed before forwarding the response to the initial client. On a 32-bit system, the pointer arithmetic used when parsing the received response to remove that record might trigger an undefined behavior leading to a crash. Se ha descubierto un problema en dns... • http://www.securityfocus.com/bid/100509 • CWE-20: Improper Input Validation •

CVSS: 7.5EPSS: 0%CPEs: 3EXPL: 1

27 Jul 2018 — An issue has been found in the parsing of authoritative answers in PowerDNS Recursor before 4.0.8, leading to a NULL pointer dereference when parsing a specially crafted answer containing a CNAME of a different class than IN. An unauthenticated remote attacker could cause a denial of service. Se ha encontrado un problema en el análisis de respuestas autorizadas en PowerDNS Recursor en versiones anteriores a la 4.0.8, lo que conduce a una desreferencia de puntero NULL al analizar una respuesta especialmente ... • https://github.com/shutingrz/CVE-2017-15120_PoC • CWE-476: NULL Pointer Dereference •

CVSS: 9.3EPSS: 0%CPEs: 1EXPL: 0

16 Jul 2018 — pdns before version 4.1.2 is vulnerable to a buffer overflow in dnsreplay. In the dnsreplay tool provided with PowerDNS Authoritative, replaying a specially crafted PCAP file can trigger a stack-based buffer overflow, leading to a crash and potentially arbitrary code execution. This buffer overflow only occurs when the -ecs-stamp option of dnsreplay is used. pdnsen versiones anteriores a la 4.1.2 es vulnerable a un desbordamiento de búfer en dnsreplay. En la herramienta dnsreplay provista con PowerDNS Autho... • https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1046 • CWE-121: Stack-based Buffer Overflow CWE-787: Out-of-bounds Write •

CVSS: 5.9EPSS: 0%CPEs: 1EXPL: 0

23 Jan 2018 — An issue has been found in the DNSSEC validation component of PowerDNS Recursor from 4.0.0 and up to and including 4.0.6, where the signatures might have been accepted as valid even if the signed data was not in bailiwick of the DNSKEY used to sign it. This allows an attacker in position of man-in-the-middle to alter the content of records by issuing a valid signature for the crafted records. Se ha descubierto un problema en el componente de validación DNSSEC de PowerDNS Recursor, desde la versión 4.0.0 has... • http://www.securityfocus.com/bid/101982 • CWE-347: Improper Verification of Cryptographic Signature •

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 0

23 Jan 2018 — A cross-site scripting issue has been found in the web interface of PowerDNS Recursor from 4.0.0 up to and including 4.0.6, where the qname of DNS queries was displayed without any escaping, allowing a remote attacker to inject HTML and Javascript code into the web interface, altering the content. Se ha encontrado un problema de Cross-Site Scripting (XSS) en la interfaz web de PowerDNS Recursor, desde la versión 4.0.0 hasta la versión 4.0.6, también incluida, en la que el qname de las consultas DNS se mostr... • http://www.securityfocus.com/bid/101982 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 5.3EPSS: 0%CPEs: 2EXPL: 0

23 Jan 2018 — When api-config-dir is set to a non-empty value, which is not the case by default, the API in PowerDNS Recursor 4.x up to and including 4.0.6 and 3.x up to and including 3.7.4 allows an authorized user to update the Recursor's ACL by adding and removing netmasks, and to configure forward zones. It was discovered that the new netmask and IP addresses of forwarded zones were not sufficiently validated, allowing an authenticated user to inject new configuration directives into the Recursor's configuration. Cua... • http://www.securityfocus.com/bid/101982 • CWE-20: Improper Input Validation •

CVSS: 7.1EPSS: 0%CPEs: 2EXPL: 0

23 Jan 2018 — An issue has been found in the API component of PowerDNS Authoritative 4.x up to and including 4.0.4 and 3.x up to and including 3.4.11, where some operations that have an impact on the state of the server are still allowed even though the API has been configured as read-only via the api-readonly keyword. This missing check allows an attacker with valid API credentials to flush the cache, trigger a zone transfer or send a NOTIFY. Se ha descubierto un problema en el componente API de PowerDNS Authoritative 4... • http://www.securityfocus.com/bid/101982 • CWE-358: Improperly Implemented Security Check for Standard CWE-863: Incorrect Authorization •