First published: Wed Sep 21 2016(Updated: )
PowerDNS (aka pdns) Authoritative Server before 3.4.10 allows remote attackers to cause a denial of service (backend CPU consumption) via a long qname.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
PowerDNS | <=3.4.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-5426 has a medium severity rating as it can lead to denial of service by consuming backend CPU resources.
CVE-2016-5426 allows remote attackers to exploit PowerDNS by sending a specially crafted long qname, causing high CPU consumption.
To fix CVE-2016-5426, upgrade PowerDNS to version 3.4.10 or later.
PowerDNS versions prior to 3.4.10, specifically 3.4.9 and earlier, are vulnerable to CVE-2016-5426.
CVE-2016-5426 enables denial of service attacks through excessive resource consumption on the backend.