First published: Tue Mar 19 2019(Updated: )
A vulnerability was found in PowerDNS Authoritative Server before 4.0.7 and before 4.1.7. An insufficient validation of data coming from the user when building a HTTP request from a DNS query in the HTTP Connector of the Remote backend, allowing a remote user to cause a denial of service by making the server connect to an invalid endpoint, or possibly information disclosure by making the server connect to an internal endpoint and somehow extracting meaningful information about the response
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/pdns | 4.1.6-3+deb10u1 4.4.1-1 4.7.3-2 4.8.3-1 | |
debian/pdns | <=4.1.6-1<=4.0.3-1+deb9u3<=4.0.3-1 | 4.0.3-1+deb9u4 4.1.6-2 4.2.0-1 |
PowerDNS Authoritative Server | <4.0.7 | |
PowerDNS Authoritative Server | >=4.1.0<4.1.7 | |
Fedoraproject Fedora | =28 | |
Fedoraproject Fedora | =29 | |
<4.0.7 | ||
>=4.1.0<4.1.7 | ||
=28 | ||
=29 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-3871 is a vulnerability found in PowerDNS Authoritative Server before 4.0.7 and before 4.1.7.
CVE-2019-3871 has a severity rating of 8.8 (high).
CVE-2019-3871 can be exploited by a remote user to cause a denial of service by making a HTTP request from a DNS query in the HTTP Connector of the Remote backend.
PowerDNS Authoritative Server versions before 4.0.7 and before 4.1.7 are affected.
To fix CVE-2019-3871, update PowerDNS Authoritative Server to version 4.0.7 or 4.1.7.