First published: Wed Sep 21 2016(Updated: )
PowerDNS (aka pdns) Authoritative Server before 3.4.10 does not properly handle a . (dot) inside labels, which allows remote attackers to cause a denial of service (backend CPU consumption) via a crafted DNS query.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
PowerDNS | <=3.4.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-5427 has been assigned a medium severity rating due to its potential to cause denial of service.
To fix CVE-2016-5427, upgrade PowerDNS Authoritative Server to version 3.4.10 or later.
CVE-2016-5427 enables remote attackers to cause denial of service through crafted DNS queries.
PowerDNS Authoritative Server versions prior to 3.4.10, specifically up to version 3.4.9, are affected by CVE-2016-5427.
CVE-2016-5427 is a remote vulnerability that can be exploited by sending malicious DNS queries.