Page 7 of 72 results (0.002 seconds)

CVSS: 9.8EPSS: 0%CPEs: 18EXPL: 0

08 Jan 2010 — Unspecified vulnerability in PowerDNS Recursor before 3.1.7.2 allows remote attackers to spoof DNS data via crafted zones. Vulnerabilidad sin especificar en PowerDNS Recursor anterior a v3.1.7.2 permite a atacantes remotos suplantar datos DNS a través de zonas manipuladas. It was discovered that pdns-recursor, the PowerDNS recursive name server, contains a cache poisoning vulnerability which may allow attackers to trick the server into serving incorrect DNS data (CVE-2009-4010). • http://doc.powerdns.com/powerdns-advisory-2010-02.html •

CVSS: 7.5EPSS: 0%CPEs: 42EXPL: 0

09 Dec 2008 — PowerDNS before 2.9.21.2 allows remote attackers to cause a denial of service (daemon crash) via a CH HINFO query. PowerDNS y versiones anteriores a 2.9.21.2 permite a los atacantes remotos causar una denegación de servicios (caída del daemon) a través de una petición CH HINFO. Two vulnerabilities have been discovered in PowerDNS, possibly leading to a Denial of Service and easing cache poisoning attacks. Daniel Drown reported an error when receiving a HINFO CH query (CVE-2008-5277). Brian J. • http://doc.powerdns.com/powerdns-advisory-2008-03.html • CWE-16: Configuration •

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 0

08 Aug 2008 — PowerDNS Authoritative Server before 2.9.21.1 drops malformed queries, which might make it easier for remote attackers to poison DNS caches of other products running on other servers, a different issue than CVE-2008-1447 and CVE-2008-3217. PowerDNS Authoritative Server versiones anteriores a 2.9.21.1 descarga peticiones malformadas, lo cual puede hacer más fácil a atacantes remotos envenenar cachés DNS de otros productos ejecutándose en otros servidores, una cuestión diferente a CVE-2008-1447 y CVE-2008-321... • http://doc.powerdns.com/changelog.html • CWE-20: Improper Input Validation •

CVSS: 7.5EPSS: 0%CPEs: 7EXPL: 0

18 Jul 2008 — PowerDNS Recursor before 3.1.6 does not always use the strongest random number generator for source port selection, which makes it easier for remote attack vectors to conduct DNS cache poisoning. NOTE: this is related to incomplete integration of security improvements associated with addressing CVE-2008-1637. PowerDNS Recursor anterior a 3.1.6 no utiliza siempre el generador de números aleatorios más robusto para la selección de un puerto de origen, lo que le hace más fácil para los vectores de ataque remot... • http://doc.powerdns.com/changelog.html#CHANGELOG-RECURSOR-3-1-6 • CWE-189: Numeric Errors •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 4

02 Apr 2008 — PowerDNS Recursor before 3.1.5 uses insufficient randomness to calculate (1) TRXID values and (2) UDP source port numbers, which makes it easier for remote attackers to poison a DNS cache, related to (a) algorithmic deficiencies in rand and random functions in external libraries, (b) use of a 32-bit seed value, and (c) choice of the time of day as the sole seeding information. PowerDNS Recursor anterior a 3.1.5 no emplea la suficiente aleatoriedad para calcular (1) los valores TRXID y (2) números de las fue... • http://doc.powerdns.com/changelog.html • CWE-189: Numeric Errors •

CVSS: 7.5EPSS: 0%CPEs: 12EXPL: 0

14 Nov 2006 — PowerDNS Recursor 3.1.3 and earlier allows remote attackers to cause a denial of service (resource exhaustion and application crash) via a CNAME record with a zero TTL, which triggers an infinite loop. PowerDNS Recursor 3.1.3 y anteriores permite a atacantes remotos provocar una denegación de servicio (agotamiento de recursos o caída de la aplicación) mediante un registro CNAME con un TTL a cero, lo cual dispara un bucle infinito. • http://doc.powerdns.com/powerdns-advisory-2006-02.html •

CVSS: 9.8EPSS: 0%CPEs: 12EXPL: 0

14 Nov 2006 — Buffer overflow in PowerDNS Recursor 3.1.3 and earlier might allow remote attackers to execute arbitrary code via a malformed TCP DNS query that prevents Recursor from properly calculating the TCP DNS query length. Desbordamiento de búfer en PowerDNS Recursor 3.1.3 y anteriores puede que permita a atacantes remotos ejecutar código de su elección mediante consultas TCP DNS mal formadas que previene a Recursor de calcular correctamente la longitud de una consulta TCP DNS. It was discovered that malformed TCP ... • http://doc.powerdns.com/powerdns-advisory-2006-01.html •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

27 Apr 2006 — The recursor in PowerDNS before 3.0.1 allows remote attackers to cause a denial of service (application crash) via malformed EDNS0 packets. • http://doc.powerdns.com/changelog.html#CHANGELOG-RECURSOR-3-0-1 • CWE-399: Resource Management Errors •

CVSS: 7.5EPSS: 0%CPEs: 18EXPL: 0

31 Dec 2005 — The DNS implementation of PowerDNS 2.9.16 and earlier allows remote attackers to cause a denial of service via a compressed DNS packet with a label length byte with an incorrect offset, which could trigger an infinite loop. • http://www.niscc.gov.uk/niscc/docs/al-20050524-00433.html •

CVSS: 7.5EPSS: 0%CPEs: 17EXPL: 0

19 Jul 2005 — PowerDNS before 2.9.18, when running with an LDAP backend, does not properly escape LDAP queries, which allows remote attackers to cause a denial of service (failure to answer ldap questions) and possibly conduct an LDAP injection attack. PowerDNS anterior a la 2.9.18, cuando se ejecuta en LDAP, no escapa adecuadamente las peticiones LDAP, lo que permite que atacantes remotos causen una denegación de servicio. Several problems have been discovered in pdns, a versatile nameserver that can lead to a denial of... • http://doc.powerdns.com/changelog.html#CHANGELOG-2-9-18 •