7.5
CVSSv3

CVE-2017-15120

Published: 27/07/2018 Updated: 09/10/2019
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

An issue has been found in the parsing of authoritative answers in PowerDNS Recursor prior to 4.0.8, leading to a NULL pointer dereference when parsing a specially crafted answer containing a CNAME of a different class than IN. An unauthenticated remote attacker could cause a denial of service.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

powerdns recursor

debian debian linux 8.0

debian debian linux 9.0

Vendor Advisories

Toshifumi Sakaguchi discovered that PowerDNS Recursor, a high-performance resolving name server was susceptible to denial of service via a crafted CNAME answer The oldstable distribution (jessie) is not affected For the stable distribution (stretch), this problem has been fixed in version 404-1+deb9u3 We recommend that you upgrade your pdns-re ...

Github Repositories

PowerDNS CVE-2017-15120 / DO NOT ABUSE

CVE-2017-15120_PoC PowerDNS CVE-2017-15120 / DO NOT ABUSE