
CVE-2008-3217
https://notcve.org/view.php?id=CVE-2008-3217
18 Jul 2008 — PowerDNS Recursor before 3.1.6 does not always use the strongest random number generator for source port selection, which makes it easier for remote attack vectors to conduct DNS cache poisoning. NOTE: this is related to incomplete integration of security improvements associated with addressing CVE-2008-1637. PowerDNS Recursor anterior a 3.1.6 no utiliza siempre el generador de números aleatorios más robusto para la selección de un puerto de origen, lo que le hace más fácil para los vectores de ataque remot... • http://doc.powerdns.com/changelog.html#CHANGELOG-RECURSOR-3-1-6 • CWE-189: Numeric Errors •

CVE-2008-1637
https://notcve.org/view.php?id=CVE-2008-1637
02 Apr 2008 — PowerDNS Recursor before 3.1.5 uses insufficient randomness to calculate (1) TRXID values and (2) UDP source port numbers, which makes it easier for remote attackers to poison a DNS cache, related to (a) algorithmic deficiencies in rand and random functions in external libraries, (b) use of a 32-bit seed value, and (c) choice of the time of day as the sole seeding information. PowerDNS Recursor anterior a 3.1.5 no emplea la suficiente aleatoriedad para calcular (1) los valores TRXID y (2) números de las fue... • http://doc.powerdns.com/changelog.html • CWE-189: Numeric Errors •

CVE-2006-4252
https://notcve.org/view.php?id=CVE-2006-4252
14 Nov 2006 — PowerDNS Recursor 3.1.3 and earlier allows remote attackers to cause a denial of service (resource exhaustion and application crash) via a CNAME record with a zero TTL, which triggers an infinite loop. PowerDNS Recursor 3.1.3 y anteriores permite a atacantes remotos provocar una denegación de servicio (agotamiento de recursos o caída de la aplicación) mediante un registro CNAME con un TTL a cero, lo cual dispara un bucle infinito. • http://doc.powerdns.com/powerdns-advisory-2006-02.html •

CVE-2006-4251
https://notcve.org/view.php?id=CVE-2006-4251
14 Nov 2006 — Buffer overflow in PowerDNS Recursor 3.1.3 and earlier might allow remote attackers to execute arbitrary code via a malformed TCP DNS query that prevents Recursor from properly calculating the TCP DNS query length. Desbordamiento de búfer en PowerDNS Recursor 3.1.3 y anteriores puede que permita a atacantes remotos ejecutar código de su elección mediante consultas TCP DNS mal formadas que previene a Recursor de calcular correctamente la longitud de una consulta TCP DNS. • http://doc.powerdns.com/powerdns-advisory-2006-01.html •

CVE-2006-2069
https://notcve.org/view.php?id=CVE-2006-2069
27 Apr 2006 — The recursor in PowerDNS before 3.0.1 allows remote attackers to cause a denial of service (application crash) via malformed EDNS0 packets. • http://doc.powerdns.com/changelog.html#CHANGELOG-RECURSOR-3-0-1 • CWE-399: Resource Management Errors •

CVE-2005-0038
https://notcve.org/view.php?id=CVE-2005-0038
31 Dec 2005 — The DNS implementation of PowerDNS 2.9.16 and earlier allows remote attackers to cause a denial of service via a compressed DNS packet with a label length byte with an incorrect offset, which could trigger an infinite loop. • http://www.niscc.gov.uk/niscc/docs/al-20050524-00433.html •

CVE-2005-2301
https://notcve.org/view.php?id=CVE-2005-2301
19 Jul 2005 — PowerDNS before 2.9.18, when running with an LDAP backend, does not properly escape LDAP queries, which allows remote attackers to cause a denial of service (failure to answer ldap questions) and possibly conduct an LDAP injection attack. PowerDNS anterior a la 2.9.18, cuando se ejecuta en LDAP, no escapa adecuadamente las peticiones LDAP, lo que permite que atacantes remotos causen una denegación de servicio. • http://doc.powerdns.com/changelog.html#CHANGELOG-2-9-18 •

CVE-2005-2302
https://notcve.org/view.php?id=CVE-2005-2302
19 Jul 2005 — PowerDNS before 2.9.18, when allowing recursion to a restricted range of IP addresses, does not properly handle questions from clients that are denied recursion, which could cause a "blank out" of answers to those clients that are allowed to use recursion. PowerDNS anterior a la 2.9.18, cuando permite recursión en un rango restringido de direcciones IP, no maneja adecuadamente peticiones de clientes a los que se les deniega la recursión. Esto podría causar un "bank out" de respuestas a aquellos clientes que... • http://doc.powerdns.com/changelog.html#CHANGELOG-2-9-18 •

CVE-2005-0428
https://notcve.org/view.php?id=CVE-2005-0428
15 Feb 2005 — The DNSPacket::expand method in dnspacket.cc in PowerDNS before 2.9.17 allows remote attackers to cause a denial of service by sending a random stream of bytes. El método DNSPacket::expand en dnspacket.cc de PowerDNS anterior a la 2.9.17 permite a atacantes remotos causar la Denegación de Servicios (DoS) mediante el envío de un flujo aleatorio de bytes. • http://doc.powerdns.com/changelog.html#CHANGELOG-2-9-17 •