First published: Tue Jul 30 2019(Updated: )
A Vulnerability has been found in PowerDNS Authoritative Server before versions 4.1.9, 4.0.8 allowing a remote, authorized master server to cause a high CPU load or even prevent any further updates to any slave zone by sending a large number of NOTIFY messages. Note that only servers configured as slaves are affected by this issue.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
PowerDNS Authoritative | >=4.0.0<4.0.8 | |
PowerDNS Authoritative | >=4.1.0<4.1.9 | |
PowerDNS Authoritative | =4.1.0 | |
Opensuse Backports | =sle-15 | |
Opensuse Backports | =sle-15-sp1 | |
openSUSE Leap | =15.0 | |
openSUSE Leap | =15.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2019-10163.
The severity of CVE-2019-10163 is medium with a severity score of 4.3.
CVE-2019-10163 allows a remote, authorized master server to cause a high CPU load or prevent further updates to any slave zone by sending a large number of NOTIFY messages.
PowerDNS Authoritative Server versions 4.0.0 to 4.0.8 and versions 4.1.0 to 4.1.9 are affected by CVE-2019-10163.
To fix CVE-2019-10163, upgrade PowerDNS Authoritative Server to version 4.1.9 if using versions 4.1.0 to 4.1.8, or upgrade to version 4.0.9 if using versions 4.0.0 to 4.0.8.