Show filters
68 Total Results
Displaying 21-30 of 68
Sort by:
Attacker Value
Unknown
CVE-2019-10163
Disclosure Date: July 30, 2019 (last updated November 27, 2024)
A Vulnerability has been found in PowerDNS Authoritative Server before versions 4.1.9, 4.0.8 allowing a remote, authorized master server to cause a high CPU load or even prevent any further updates to any slave zone by sending a large number of NOTIFY messages. Note that only servers configured as slaves are affected by this issue.
0
Attacker Value
Unknown
CVE-2019-10162
Disclosure Date: July 30, 2019 (last updated November 27, 2024)
A vulnerability has been found in PowerDNS Authoritative Server before versions 4.1.10, 4.0.8 allowing an authorized user to cause the server to exit by inserting a crafted record in a MASTER type zone under their control. The issue is due to the fact that the Authoritative Server will exit when it runs into a parsing error while looking up the NS/A/AAAA records it is about to use for an outgoing notify.
0
Attacker Value
Unknown
CVE-2019-3871
Disclosure Date: March 21, 2019 (last updated November 08, 2023)
A vulnerability was found in PowerDNS Authoritative Server before 4.0.7 and before 4.1.7. An insufficient validation of data coming from the user when building a HTTP request from a DNS query in the HTTP Connector of the Remote backend, allowing a remote user to cause a denial of service by making the server connect to an invalid endpoint, or possibly information disclosure by making the server connect to an internal endpoint and somehow extracting meaningful information about the response
0
Attacker Value
Unknown
CVE-2019-3807
Disclosure Date: January 29, 2019 (last updated November 27, 2024)
An issue has been found in PowerDNS Recursor versions 4.1.x before 4.1.9 where records in the answer section of responses received from authoritative servers with the AA flag not set were not properly validated, allowing an attacker to bypass DNSSEC validation.
0
Attacker Value
Unknown
CVE-2019-3806
Disclosure Date: January 29, 2019 (last updated November 27, 2024)
An issue has been found in PowerDNS Recursor versions after 4.1.3 before 4.1.9 where Lua hooks are not properly applied to queries received over TCP in some specific combination of settings, possibly bypassing security policies enforced using Lua.
0
Attacker Value
Unknown
CVE-2018-16855
Disclosure Date: December 03, 2018 (last updated November 27, 2024)
An issue has been found in PowerDNS Recursor before version 4.1.8 where a remote attacker sending a DNS query can trigger an out-of-bounds memory read while computing the hash of the query for a packet cache lookup, possibly leading to a crash.
0
Attacker Value
Unknown
CVE-2018-14626
Disclosure Date: November 29, 2018 (last updated November 27, 2024)
PowerDNS Authoritative Server 4.1.0 up to 4.1.4 inclusive and PowerDNS Recursor 4.0.0 up to 4.1.4 inclusive are vulnerable to a packet cache pollution via crafted query that can lead to denial of service.
0
Attacker Value
Unknown
CVE-2018-10851
Disclosure Date: November 29, 2018 (last updated November 27, 2024)
PowerDNS Authoritative Server 3.3.0 up to 4.1.4 excluding 4.1.5 and 4.0.6, and PowerDNS Recursor 3.2 up to 4.1.4 excluding 4.1.5 and 4.0.9, are vulnerable to a memory leak while parsing malformed records that can lead to remote denial of service.
0
Attacker Value
Unknown
CVE-2018-14663
Disclosure Date: November 26, 2018 (last updated November 27, 2024)
An issue has been found in PowerDNS DNSDist before 1.3.3 allowing a remote attacker to craft a DNS query with trailing data such that the addition of a record by dnsdist, for example an OPT record when adding EDNS Client Subnet, might result in the trailing data being smuggled to the backend as a valid record while not seen by dnsdist. This is an issue when dnsdist is deployed as a DNS Firewall and used to filter some records that should not be received by the backend. This issue occurs only when either the 'useClientSubnet' or the experimental 'addXPF' parameters are used when declaring a new backend.
0
Attacker Value
Unknown
CVE-2018-14644
Disclosure Date: November 09, 2018 (last updated November 27, 2024)
An issue has been found in PowerDNS Recursor from 4.0.0 up to and including 4.1.4. A remote attacker sending a DNS query for a meta-type like OPT can lead to a zone being wrongly cached as failing DNSSEC validation. It only arises if the parent zone is signed, and all the authoritative servers for that parent zone answer with FORMERR to a query for at least one of the meta-types. As a result, subsequent queries from clients requesting DNSSEC validation will be answered with a ServFail.
0