First published: Tue Jan 23 2018(Updated: )
An issue has been found in the DNSSEC parsing code of PowerDNS Recursor from 4.0.0 up to and including 4.0.6 leading to a memory leak when parsing specially crafted DNSSEC ECDSA keys. These keys are only parsed when validation is enabled by setting dnssec to a value other than off or process-no-validate (default).
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
PowerDNS | >=4.0.0<=4.0.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-15094 is an issue in the DNSSEC parsing code of PowerDNS Recursor from version 4.0.0 up to and including version 4.0.6, which leads to a memory leak when parsing specially crafted DNSSEC ECDSA keys.
The severity of CVE-2017-15094 is medium with a CVSS score of 5.9.
CVE-2017-15094 affects PowerDNS Recursor versions 4.0.0 to 4.0.6, causing a memory leak when parsing certain DNSSEC ECDSA keys.
To fix CVE-2017-15094, upgrade PowerDNS Recursor to a version beyond 4.0.6.
You can find more information about CVE-2017-15094 at the following references: http://www.securityfocus.com/bid/101982 and https://doc.powerdns.com/recursor/security-advisories/powerdns-advisory-2017-07.html.