[prev in list] [next in list] [prev in thread] [next in thread] 

List:       oss-security
Subject:    [oss-security] PowerDNS Security Advisory 2018-09
From:       Remi Gacogne <remi.gacogne () powerdns ! com>
Date:       2018-11-26 16:14:58
Message-ID: 781fff1e-455c-ab4f-16bb-f58b7e915488 () powerdns ! com
[Download RAW message or body]

[Attachment #2 (multipart/mixed)]


Hi all,

We just released PowerDNS Recursor 4.1.8, fixing a minor security issue
that we recently discovered, affecting PowerDNS Recursor from 4.1.0 up
to and including 4.1.7.

The issue is that a remote attacker can trigger an out-of-bounds memory
read via a crafted query, while computing the hash of the query for a
packet cache lookup, possibly leading to a crash.

When the PowerDNS Recursor is run inside a supervisor like supervisord
or systemd, a crash will lead to an automatic restart,
limiting the impact to a somewhat degraded service.

This issue has been assigned CVE-2018-16855 by Red Hat.

The full security advisory is provided below, and can also be
found at
https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2018-09.html

A minimal patch can also be found here:
https://downloads.powerdns.com/patches/2018-09/

Please feel free to contact me directly if you have any question.

Best regards,

Remi Gacogne
PowerDNS.COM BV - https://www.powerdns.com/

PowerDNS Security Advisory 2018-09: Crafted query can cause a denial of
service
===============================================================================

-  CVE: CVE-2018-16855
-  Date: 26th of November 2018
-  Affects: PowerDNS Recursor from 4.1.0 up to and including 4.1.7
-  Not affected: 4.0.x, 4.1.8
-  Severity: Medium
-  Impact: Denial of service
-  Exploit: This problem can be triggered via crafted queries
-  Risk of system compromise: No
-  Solution: Upgrade to a non-affected version

An issue has been found in PowerDNS Recursor where a remote attacker
sending a DNS query can trigger an out-of-bounds memory read while
computing the hash of the query for a packet cache lookup, possibly
leading to a crash.

This issue has been assigned CVE-2018-16855 by Red Hat.

When the PowerDNS Recursor is run inside a supervisor like supervisord
or systemd, a crash will lead to an automatic restart, limiting the
impact to a somewhat degraded service.

PowerDNS Recursor from 4.1.0 up to and including 4.1.7 is affected.


["signature.asc" (application/pgp-signature)]

[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic