5
CVSSv2

CVE-2019-10162

Published: 30/07/2019 Updated: 02/10/2020
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

A vulnerability has been found in PowerDNS Authoritative Server prior to 4.1.10, 4.0.8 allowing an authorized user to cause the server to exit by inserting a crafted record in a MASTER type zone under their control. The issue is due to the fact that the Authoritative Server will exit when it runs into a parsing error while looking up the NS/A/AAAA records it is about to use for an outgoing notify.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

powerdns authoritative 4.0.0

powerdns authoritative

opensuse leap 15.0

opensuse leap 15.1

Vendor Advisories

Two vulnerabilities have been discovered in pdns, an authoritative DNS server which may result in denial of service via malformed zone records and excessive NOTIFY packets in a master/slave setup For the stable distribution (stretch), these problems have been fixed in version 403-1+deb9u5 We recommend that you upgrade your pdns packages For th ...

Mailing Lists

<!--X-Body-Begin--> <!--X-User-Header--> oss-sec mailing list archives <!--X-User-Header-End--> <!--X-TopPNI--> By Date By Thread </form> <!--X-TopPNI-End--> <!--X-MsgBody--> <!--X-Subject-Header-Begin--> PowerDNS Security Advisories 2019-04 and 2019-05 <!--X-Subject-Header-End--> <!--X-Head-of-Message--> From: Erik Winkels &lt ...