[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247768

 
 

909

 
 

194555

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

DSA-4424-1 pdns -- pdns

ID: oval:org.secpod.oval:def:603842Date: (C)2019-04-08   (M)2023-11-13
Class: PATCHFamily: unix




Adam Dobrawy, Frederico Silva and Gregory Brzeski from HyperOne.com discovered that pdns, an authoritative DNS server, did not properly validate user-supplied data when building a HTTP request from a DNS query in the HTTP Connector of the Remote backend. This would allow a remote user to cause either a denial-of-service, or information disclosure.

Platform:
Debian 9.x
Product:
pdns-backend-lua
pdns-backend-pipe
pdns-backend-opendbx
pdns-server
pdns-backend-sqlite3
pdns-backend-tinydns
pdns-backend-mydns
pdns-backend-remote
pdns-backend-geoip
pdns-backend-ldap
pdns-backend-odbc
pdns-tools
pdns-backend-bind
pdns-backend-mysql
pdns-backend-pgsql
Reference:
DSA-4424-1
CVE-2019-3871
CVE    1
CVE-2019-3871
CPE    2
cpe:/a:powerdns:pdns-server
cpe:/o:debian:debian_linux:9.x

© SecPod Technologies