First published: Mon Nov 02 2015(Updated: )
The label decompression functionality in PowerDNS Recursor before 3.6.4 and 3.7.x before 3.7.3 and Authoritative (Auth) Server before 3.3.3 and 3.4.x before 3.4.5 allows remote attackers to cause a denial of service (CPU consumption or crash) via a request with a long name that refers to itself. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-1868.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
PowerDNS | <=3.3.2 | |
PowerDNS | =3.4.0 | |
PowerDNS | =3.4.1 | |
PowerDNS | =3.4.2 | |
PowerDNS | =3.4.3 | |
PowerDNS | =3.4.4 | |
PowerDNS | <=3.6.3 | |
PowerDNS | =3.7.1 | |
PowerDNS | =3.7.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-5470 has a severity rating that indicates it can lead to denial of service attacks, affecting CPU consumption and stability.
To mitigate CVE-2015-5470, upgrade PowerDNS Recursor to version 3.6.4 or higher and the Authoritative Server to version 3.4.5 or higher.
CVE-2015-5470 affects PowerDNS Recursor versions before 3.6.4 and 3.7.x before 3.7.3, as well as Authoritative versions before 3.3.3 and 3.4.x before 3.4.5.
CVE-2015-5470 enables remote attackers to launch denial of service attacks by causing high CPU consumption or crashes through specific DNS name requests.
There are no documented workarounds for CVE-2015-5470, so upgrading to a patched version is the recommended approach.