First published: Mon Dec 03 2018(Updated: )
An issue has been found in PowerDNS Recursor before version 4.1.8 where a remote attacker sending a DNS query can trigger an out-of-bounds memory read while computing the hash of the query for a packet cache lookup, possibly leading to a crash.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
PowerDNS | <4.1.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-16855 is an issue found in PowerDNS Recursor before version 4.1.8 that allows a remote attacker to trigger an out-of-bounds memory read and possibly crash the system.
CVE-2018-16855 has a severity rating of 7.5 (High).
PowerDNS Recursor versions up to and exclusive of 4.1.8 are affected by CVE-2018-16855.
Upgrade to PowerDNS Recursor version 4.1.8 or newer to fix CVE-2018-16855.
More information about CVE-2018-16855 can be found at Red Hat Bugzilla (https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16855) and the PowerDNS Recursor Security Advisory (https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2018-09.html).