5
CVSSv2

CVE-2016-7069

Published: 11/09/2018 Updated: 09/10/2019
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

An issue has been found in dnsdist prior to 1.2.0 in the way EDNS0 OPT records are handled when parsing responses from a backend. When dnsdist is configured to add EDNS Client Subnet to a query, the response may contain an EDNS0 OPT record that has to be removed before forwarding the response to the initial client. On a 32-bit system, the pointer arithmetic used when parsing the received response to remove that record might trigger an undefined behavior leading to a crash.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

powerdns dnsdist

Vendor Advisories

Debian Bug report logs - #872854 dnsdist: CVE-2016-7069 CVE-2017-7557 Package: src:dnsdist; Maintainer for src:dnsdist is dnsdist packagers <dnsdist@packagesdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Mon, 21 Aug 2017 20:18:04 UTC Severity: important Tags: patch, security, upstream Foun ...