Latest powerdns authoritative Vulnerabilities

An issue was discovered in PowerDNS Authoritative through 4.3.0 when --enable-experimental-gss-tsig is used. A remote, unauthenticated attacker can cause a denial of service by sending crafted queries...
PowerDNS Authoritative<=4.3.0
An issue was discovered in PowerDNS Authoritative through 4.3.0 when --enable-experimental-gss-tsig is used. A remote, unauthenticated attacker can trigger a race condition leading to a crash, or poss...
PowerDNS Authoritative<=4.3.0
An issue has been found in PowerDNS Authoritative Server before 4.3.1 where an authorized user with the ability to insert crafted records into a zone might be able to leak the content of uninitialized...
PowerDNS Authoritative<4.3.1
An issue was discovered in PowerDNS Authoritative through 4.3.0 when --enable-experimental-gss-tsig is used. A remote, unauthenticated attacker might be able to cause a double-free, leading to a crash...
PowerDNS Authoritative<=4.3.0
The DNS packet parsing/generation code in PowerDNS (aka pdns) Authoritative Server 3.4.x before 3.4.6 allows remote attackers to cause a denial of service (crash) via crafted query packets.
PowerDNS Authoritative>=3.4.0<3.4.6
Debian Debian Linux=8.0
Debian Debian Linux=9.0
A vulnerability has been found in PowerDNS Authoritative Server before versions 4.1.10, 4.0.8 allowing an authorized user to cause the server to exit by inserting a crafted record in a MASTER type zon...
PowerDNS Authoritative>=4.0.0<4.0.8
PowerDNS Authoritative>=4.1.0<4.1.10
PowerDNS Authoritative=4.0.0
openSUSE Leap=15.0
openSUSE Leap=15.1
A Vulnerability has been found in PowerDNS Authoritative Server before versions 4.1.9, 4.0.8 allowing a remote, authorized master server to cause a high CPU load or even prevent any further updates to...
PowerDNS Authoritative>=4.0.0<4.0.8
PowerDNS Authoritative>=4.1.0<4.1.9
PowerDNS Authoritative=4.1.0
Opensuse Backports=sle-15
Opensuse Backports=sle-15-sp1
openSUSE Leap=15.0
and 1 more
An issue has been found in PowerDNS Authoritative Server versions up to and including 3.4.10, 4.0.1 allowing an authorized user to crash the server by inserting a specially crafted record in a zone un...
PowerDNS Authoritative<=3.4.10
PowerDNS Authoritative>=4.0.0<=4.0.1
Debian Debian Linux=8.0
debian/pdns
An issue has been found in PowerDNS before 3.4.11 and 4.0.2, and PowerDNS recursor before 4.0.4, allowing an attacker in position of man-in-the-middle to alter the content of an AXFR because of insuff...
PowerDNS Authoritative<3.4.11
PowerDNS Authoritative>=4.0.0<4.0.2
PowerDNS Recursor<3.7.4
PowerDNS Recursor>=4.0.0<4.0.4
Debian Debian Linux=8.0
debian/pdns
and 1 more
An issue has been found in PowerDNS before 3.4.11 and 4.0.2, and PowerDNS recursor before 4.0.4, allowing an attacker in position of man-in-the-middle to alter the content of an AXFR because of insuff...
PowerDNS Authoritative<3.4.11
PowerDNS Authoritative>=4.0.0<4.0.2
PowerDNS Recursor<4.0.4
Debian Debian Linux=8.0
debian/pdns
debian/pdns-recursor
An issue has been found in PowerDNS before 3.4.11 and 4.0.2, and PowerDNS recursor before 3.7.4 and 4.0.4, allowing a remote, unauthenticated attacker to cause an abnormal CPU usage load on the PowerD...
PowerDNS Authoritative<3.4.11
PowerDNS Authoritative>=4.0.0<4.0.2
PowerDNS Recursor<3.7.4
PowerDNS Recursor>=4.0.0<4.0.4
Debian Debian Linux=8.0
debian/pdns
and 1 more
An issue has been found in PowerDNS Authoritative Server before 3.4.11 and 4.0.2 allowing a remote, unauthenticated attacker to cause a denial of service by opening a large number of TCP connections t...
PowerDNS Authoritative<3.4.11
PowerDNS Authoritative>=4.0.0<4.0.2
Debian Debian Linux=8.0
debian/pdns

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203