First published: Thu Nov 29 2018(Updated: )
Last updated 14 January 2025
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/pdns | 4.4.1-1 4.7.3-2 4.9.3-1 | |
debian/pdns-recursor | 4.4.2-3 4.8.8-1 5.1.3-1 | |
PowerDNS | >=4.1.0<=4.1.4 | |
PowerDNS | >=4.0.0<=4.1.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-14626 is a vulnerability in PowerDNS Authoritative Server and PowerDNS Recursor that allows packet cache pollution via a crafted query, leading to denial of service.
PowerDNS Authoritative Server versions 4.1.0 to 4.1.4 and PowerDNS Recursor versions 4.0.0 to 4.1.4 are affected.
CVE-2018-14626 has a severity rating of high with a CVSS score of 7.5.
The vulnerability can be exploited by sending a crafted query to the vulnerable PowerDNS server, polluting the packet cache and causing denial of service.
Yes, PowerDNS has released security advisories for both the PowerDNS Authoritative Server and PowerDNS Recursor, providing patches to address the vulnerability.