Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2016-2120

Опубликовано: 01 нояб. 2018
Источник: debian
EPSS Низкий

Описание

An issue has been found in PowerDNS Authoritative Server versions up to and including 3.4.10, 4.0.1 allowing an authorized user to crash the server by inserting a specially crafted record in a zone under their control then sending a DNS query for that record. The issue is due to an integer overflow when checking if the content of the record matches the expected size, allowing an attacker to cause a read past the buffer boundary.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
pdnsfixed4.0.2-1package

Примечания

  • https://doc.powerdns.com/md/security/powerdns-advisory-2016-05/

EPSS

Процентиль: 33%
0.00131
Низкий

Связанные уязвимости

CVSS3: 7.5
ubuntu
больше 7 лет назад

An issue has been found in PowerDNS Authoritative Server versions up to and including 3.4.10, 4.0.1 allowing an authorized user to crash the server by inserting a specially crafted record in a zone under their control then sending a DNS query for that record. The issue is due to an integer overflow when checking if the content of the record matches the expected size, allowing an attacker to cause a read past the buffer boundary.

CVSS3: 7.5
nvd
больше 7 лет назад

An issue has been found in PowerDNS Authoritative Server versions up to and including 3.4.10, 4.0.1 allowing an authorized user to crash the server by inserting a specially crafted record in a zone under their control then sending a DNS query for that record. The issue is due to an integer overflow when checking if the content of the record matches the expected size, allowing an attacker to cause a read past the buffer boundary.

CVSS3: 6.5
github
больше 3 лет назад

An issue has been found in PowerDNS Authoritative Server versions up to and including 3.4.10, 4.0.1 allowing an authorized user to crash the server by inserting a specially crafted record in a zone under their control then sending a DNS query for that record. The issue is due to an integer overflow when checking if the content of the record matches the expected size, allowing an attacker to cause a read past the buffer boundary.

suse-cvrf
около 9 лет назад

Security update for pdns

EPSS

Процентиль: 33%
0.00131
Низкий