[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248149

 
 

909

 
 

194803

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

DSA-3664-1 pdns -- pdns

ID: oval:org.secpod.oval:def:602609Date: (C)2016-09-21   (M)2022-09-23
Class: PATCHFamily: unix




Multiple vulnerabilities have been discovered in pdns, an authoritative DNS server. The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2016-5426 / CVE-2016-5427 Florian Heinz and Martin Kluge reported that the PowerDNS Authoritative Server accepts queries with a qname"s length larger than 255 bytes and does not properly handle dot inside labels. A remote, unauthenticated attacker can take advantage of these flaws to cause abnormal load on the PowerDNS backend by sending specially crafted DNS queries, potentially leading to a denial of service. CVE-2016-6172 It was reported that a malicious primary DNS server can crash a secondary PowerDNS server due to improper restriction of zone size limits. This update adds a feature to limit AXFR sizes in response to this flaw.

Platform:
Debian 8.x
Product:
pdns-recursor
Reference:
DSA-3664-1
CVE-2016-5426
CVE-2016-5427
CVE-2016-6172
CVE    3
CVE-2016-6172
CVE-2016-5427
CVE-2016-5426
CPE    2
cpe:/a:powerdns:pdns-recursor
cpe:/o:debian:debian_linux:8.x

© SecPod Technologies