First published: Fri Nov 22 2019(Updated: )
PowerDNS Authoritative daemon , pdns versions 4.0.x before 4.0.9, 4.1.x before 4.1.11, exiting when encountering a serial between 2^31 and 2^32-1 while trying to notify a slave leads to DoS.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
PowerDNS Authoritative Server | >=4.0.0<4.0.9 | |
PowerDNS Authoritative Server | >=4.1.0<4.1.11 | |
Linux Linux kernel |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2019-10203 is medium with a severity value of 4.3.
Versions 4.0.x before 4.0.9 and 4.1.x before 4.1.11 of the PowerDNS Authoritative daemon pdns are affected.
CVE-2019-10203 can lead to DoS (Denial of Service) if a serial between 2^31 and 2^32-1 is encountered while trying to notify a slave.
To fix CVE-2019-10203, you should upgrade to PowerDNS Authoritative daemon pdns versions 4.0.9 or 4.1.11.
More information about CVE-2019-10203 can be found in the references: [Bugzilla Red Hat](https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10203) and [PowerDNS Advisory](https://doc.powerdns.com/authoritative/security-advisories/powerdns-advisory-2019-06.html).