Page 5 of 26 results (0.007 seconds)

CVSS: 10.0EPSS: 3%CPEs: 18EXPL: 0

Buffer overflow in PowerDNS Recursor before 3.1.7.2 allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via crafted packets. Desbordamiento de búfer en PowerDNS Recursor anterior a v3.1.7.2 permite a atacantes remotos provocar una denegación de servicio (caída del demonio) o posiblemente ejecutar código de su elección a través de paquetes manipulados. • http://doc.powerdns.com/powerdns-advisory-2010-01.html http://secunia.com/advisories/38004 http://secunia.com/advisories/38068 http://securitytracker.com/id?1023403 http://www.securityfocus.com/archive/1/508743/100/0/threaded http://www.securityfocus.com/bid/37650 http://www.vupen.com/english/advisories/2010/0054 https://bugzilla.redhat.com/show_bug.cgi?id=552285 https://exchange.xforce.ibmcloud.com/vulnerabilities/55438 https://www.redhat.com/archives/fedora-package-announce/2010 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.5EPSS: 0%CPEs: 18EXPL: 0

Unspecified vulnerability in PowerDNS Recursor before 3.1.7.2 allows remote attackers to spoof DNS data via crafted zones. Vulnerabilidad sin especificar en PowerDNS Recursor anterior a v3.1.7.2 permite a atacantes remotos suplantar datos DNS a través de zonas manipuladas. • http://doc.powerdns.com/powerdns-advisory-2010-02.html http://secunia.com/advisories/38004 http://secunia.com/advisories/38068 http://securitytracker.com/id?1023404 http://www.securityfocus.com/archive/1/508743/100/0/threaded http://www.securityfocus.com/bid/37653 http://www.vupen.com/english/advisories/2010/0054 https://bugzilla.redhat.com/show_bug.cgi?id=552285 https://exchange.xforce.ibmcloud.com/vulnerabilities/55439 https://www.redhat.com/archives/fedora-package-announce/2010 •

CVSS: 6.8EPSS: 1%CPEs: 7EXPL: 0

PowerDNS Recursor before 3.1.6 does not always use the strongest random number generator for source port selection, which makes it easier for remote attack vectors to conduct DNS cache poisoning. NOTE: this is related to incomplete integration of security improvements associated with addressing CVE-2008-1637. PowerDNS Recursor anterior a 3.1.6 no utiliza siempre el generador de números aleatorios más robusto para la selección de un puerto de origen, lo que le hace más fácil para los vectores de ataque remotos para llevar a cabo un ataque por envenenamiento de caché DNS. NOTA: Esto está relacionado con la incompleta integración de las mejoras de la seguridad asociados con CVE-2008-1637. • http://doc.powerdns.com/changelog.html#CHANGELOG-RECURSOR-3-1-6 http://secunia.com/advisories/31311 http://wiki.powerdns.com/cgi-bin/trac.fcgi/changeset/1179 http://www.openwall.com/lists/oss-security/2008/07/09/10 http://www.openwall.com/lists/oss-security/2008/07/10/6 http://www.openwall.com/lists/oss-security/2008/07/16/12 http://www.securityfocus.com/bid/30782 https://exchange.xforce.ibmcloud.com/vulnerabilities/43925 https://www.redhat.com/archives/fedora-pa • CWE-189: Numeric Errors •

CVSS: 6.8EPSS: 0%CPEs: 1EXPL: 4

PowerDNS Recursor before 3.1.5 uses insufficient randomness to calculate (1) TRXID values and (2) UDP source port numbers, which makes it easier for remote attackers to poison a DNS cache, related to (a) algorithmic deficiencies in rand and random functions in external libraries, (b) use of a 32-bit seed value, and (c) choice of the time of day as the sole seeding information. PowerDNS Recursor anterior a 3.1.5 no emplea la suficiente aleatoriedad para calcular (1) los valores TRXID y (2) números de las fuentes de los puertos UDP; esto hace que sea más fácil a los atacantes remotos envenenar una caché de DNS relacionada con (a) deficiencias algorítmicas en las funciones rand y random de librerias externas, (b) uso de una semilla de 32-bit, y (3) elección del momento del día como la única semilla de información. • http://doc.powerdns.com/changelog.html http://doc.powerdns.com/powerdns-advisory-2008-01.html http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00001.html http://secunia.com/advisories/29584 http://secunia.com/advisories/29737 http://secunia.com/advisories/29764 http://secunia.com/advisories/29830 http://secunia.com/advisories/30581 http://security.gentoo.org/glsa/glsa-200804-22.xml http://www.debian.org/security/2008/dsa-1544 http://www.securityfocus.com/archive • CWE-189: Numeric Errors •

CVSS: 5.0EPSS: 1%CPEs: 12EXPL: 0

PowerDNS Recursor 3.1.3 and earlier allows remote attackers to cause a denial of service (resource exhaustion and application crash) via a CNAME record with a zero TTL, which triggers an infinite loop. PowerDNS Recursor 3.1.3 y anteriores permite a atacantes remotos provocar una denegación de servicio (agotamiento de recursos o caída de la aplicación) mediante un registro CNAME con un TTL a cero, lo cual dispara un bucle infinito. • http://doc.powerdns.com/powerdns-advisory-2006-02.html http://lists.suse.com/archive/suse-security-announce/2006-Nov/0007.html http://secunia.com/advisories/22824 http://secunia.com/advisories/22976 http://www.securityfocus.com/bid/21037 http://www.vupen.com/english/advisories/2006/4484 https://exchange.xforce.ibmcloud.com/vulnerabilities/30257 •