First published: Mon May 18 2015(Updated: )
The label decompression functionality in PowerDNS Recursor 3.5.x, 3.6.x before 3.6.3, and 3.7.x before 3.7.2 and Authoritative (Auth) Server 3.2.x, 3.3.x before 3.3.2, and 3.4.x before 3.4.4 allows remote attackers to cause a denial of service (CPU consumption or crash) via a request with a name that refers to itself.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
PowerDNS | =3.2 | |
PowerDNS | =3.3 | |
PowerDNS | =3.3.1 | |
PowerDNS | =3.3.2 | |
PowerDNS | =3.4.0 | |
PowerDNS | =3.4.1 | |
PowerDNS | =3.4.3 | |
Fedora | =20 | |
Fedora | =21 | |
Fedora | =22 | |
PowerDNS | =3.5 | |
PowerDNS | =3.5.1 | |
PowerDNS | =3.5.2 | |
PowerDNS | =3.5.3 | |
PowerDNS | =3.6.0 | |
PowerDNS | =3.6.1 | |
PowerDNS | =3.6.2 | |
PowerDNS | =3.6.3 | |
PowerDNS | =3.7.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-1868 is classified as a denial of service vulnerability due to high CPU consumption or crashes.
To fix CVE-2015-1868, upgrade PowerDNS Recursor to version 3.6.3 or later, and Authoritative Server to version 3.3.2 or later.
CVE-2015-1868 affects PowerDNS Recursor versions 3.5.x, 3.6.x prior to 3.6.3, and 3.7.x prior to 3.7.2; and Authoritative Server versions 3.2.x, 3.3.x prior to 3.3.2, and 3.4.x prior to 3.4.4.
An attacker exploiting CVE-2015-1868 can cause a denial of service condition, impacting service availability.
There are no specific workarounds for CVE-2015-1868; users are advised to upgrade to the fixed versions.