Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2016-2120

Опубликовано: 01 нояб. 2018
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 4
CVSS3: 7.5

Описание

An issue has been found in PowerDNS Authoritative Server versions up to and including 3.4.10, 4.0.1 allowing an authorized user to crash the server by inserting a specially crafted record in a zone under their control then sending a DNS query for that record. The issue is due to an integer overflow when checking if the content of the record matches the expected size, allowing an attacker to cause a read past the buffer boundary.

РелизСтатусПримечание
artful

ignored

end of life
bionic

not-affected

4.0.2-1
cosmic

not-affected

4.0.2-1
devel

not-affected

4.0.2-1
disco

not-affected

4.0.2-1
eoan

not-affected

4.0.2-1
esm-apps/bionic

not-affected

4.0.2-1
esm-apps/focal

not-affected

4.0.2-1
esm-apps/jammy

not-affected

4.0.2-1
esm-apps/noble

not-affected

4.0.2-1

Показывать по

EPSS

Процентиль: 33%
0.00131
Низкий

4 Medium

CVSS2

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
nvd
больше 7 лет назад

An issue has been found in PowerDNS Authoritative Server versions up to and including 3.4.10, 4.0.1 allowing an authorized user to crash the server by inserting a specially crafted record in a zone under their control then sending a DNS query for that record. The issue is due to an integer overflow when checking if the content of the record matches the expected size, allowing an attacker to cause a read past the buffer boundary.

CVSS3: 7.5
debian
больше 7 лет назад

An issue has been found in PowerDNS Authoritative Server versions up t ...

CVSS3: 6.5
github
больше 3 лет назад

An issue has been found in PowerDNS Authoritative Server versions up to and including 3.4.10, 4.0.1 allowing an authorized user to crash the server by inserting a specially crafted record in a zone under their control then sending a DNS query for that record. The issue is due to an integer overflow when checking if the content of the record matches the expected size, allowing an attacker to cause a read past the buffer boundary.

suse-cvrf
около 9 лет назад

Security update for pdns

EPSS

Процентиль: 33%
0.00131
Низкий

4 Medium

CVSS2

7.5 High

CVSS3