Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2018-1046

Опубликовано: 16 июл. 2018
Источник: debian

Описание

pdns before version 4.1.2 is vulnerable to a buffer overflow in dnsreplay. In the dnsreplay tool provided with PowerDNS Authoritative, replaying a specially crafted PCAP file can trigger a stack-based buffer overflow, leading to a crash and potentially arbitrary code execution. This buffer overflow only occurs when the -ecs-stamp option of dnsreplay is used.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
pdnsfixed4.1.2-1package
pdnsfixed4.0.3-1+deb9u3stretchpackage
pdnsnot-affectedjessiepackage
pdnsnot-affectedwheezypackage

Примечания

  • https://doc.powerdns.com/authoritative/security-advisories/powerdns-advisory-2018-02.html

  • Fixed by https://github.com/PowerDNS/pdns/commit/f9c57c98da1b1007a51680629b667d57d9b702b8

Связанные уязвимости

CVSS3: 7.8
ubuntu
больше 7 лет назад

pdns before version 4.1.2 is vulnerable to a buffer overflow in dnsreplay. In the dnsreplay tool provided with PowerDNS Authoritative, replaying a specially crafted PCAP file can trigger a stack-based buffer overflow, leading to a crash and potentially arbitrary code execution. This buffer overflow only occurs when the -ecs-stamp option of dnsreplay is used.

CVSS3: 7.8
nvd
больше 7 лет назад

pdns before version 4.1.2 is vulnerable to a buffer overflow in dnsreplay. In the dnsreplay tool provided with PowerDNS Authoritative, replaying a specially crafted PCAP file can trigger a stack-based buffer overflow, leading to a crash and potentially arbitrary code execution. This buffer overflow only occurs when the -ecs-stamp option of dnsreplay is used.

suse-cvrf
больше 7 лет назад

Security update for pdns

suse-cvrf
больше 7 лет назад

Security update for pdns

CVSS3: 7.8
github
больше 3 лет назад

pdns before version 4.1.2 is vulnerable to a buffer overflow in dnsreplay. In the dnsreplay tool provided with PowerDNS Authoritative, replaying a specially crafted PCAP file can trigger a stack-based buffer overflow, leading to a crash and potentially arbitrary code execution. This buffer overflow only occurs when the -ecs-stamp option of dnsreplay is used.