First published: Tue Sep 11 2018(Updated: )
An issue has been found in dnsdist before 1.2.0 in the way EDNS0 OPT records are handled when parsing responses from a backend. When dnsdist is configured to add EDNS Client Subnet to a query, the response may contain an EDNS0 OPT record that has to be removed before forwarding the response to the initial client. On a 32-bit system, the pointer arithmetic used when parsing the received response to remove that record might trigger an undefined behavior leading to a crash.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
PowerDNS DNSDist | <=1.2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2016-7069 is high with a severity value of 7.5.
The software affected by CVE-2016-7069 is PowerDNS DNSDist versions up to and including 1.2.0.
CVE-2016-7069 affects DNSDist by causing issues in the handling of EDNS0 OPT records when parsing responses from a backend.
To fix CVE-2016-7069, it is recommended to upgrade DNSDist to version 1.2.0 or higher.
Yes, you can find references for CVE-2016-7069 at the following links: [1] http://www.securityfocus.com/bid/100509 [2] https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-7069 [3] https://dnsdist.org/security-advisories/powerdns-advisory-for-dnsdist-2017-01.html