First published: Thu Nov 01 2018(Updated: )
An issue has been found in PowerDNS Authoritative Server versions up to and including 3.4.10, 4.0.1 allowing an authorized user to crash the server by inserting a specially crafted record in a zone under their control then sending a DNS query for that record. The issue is due to an integer overflow when checking if the content of the record matches the expected size, allowing an attacker to cause a read past the buffer boundary.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
PowerDNS Authoritative | <=3.4.10 | |
PowerDNS Authoritative | >=4.0.0<=4.0.1 | |
Debian Debian Linux | =8.0 | |
debian/pdns | 4.1.6-3+deb10u1 4.4.1-1 4.7.3-2 4.8.3-1 4.8.3-2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-2120 is an issue found in PowerDNS Authoritative Server versions up to and including 3.4.10, 4.0.1 that allows an authorized user to crash the server by inserting a specially crafted record in a zone under their control.
The severity of CVE-2016-2120 is high with a CVSS score of 6.5.
PowerDNS Authoritative Server versions up to and including 3.4.10, 4.0.1 are affected by CVE-2016-2120.
To fix CVE-2016-2120, users should update their PowerDNS Authoritative Server to version 4.1.6-3+deb10u1 or later.
More information about CVE-2016-2120 can be found at the following references: [PowerDNS Advisory](https://doc.powerdns.com/md/security/powerdns-advisory-2016-05/), [Debian Security Tracker](https://security-tracker.debian.org/tracker/CVE-2016-2120), [Red Hat Bugzilla](https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-2120).