[prev in list] [next in list] [prev in thread] [next in thread]
List: oss-security
Subject: [oss-security] PowerDNS Security Advisory 2018-09
From: Remi Gacogne <remi.gacogne () powerdns ! com>
Date: 2018-11-26 16:14:58
Message-ID: 781fff1e-455c-ab4f-16bb-f58b7e915488 () powerdns ! com
[Download RAW message or body]
[Attachment #2 (multipart/mixed)]
Hi all,
We just released PowerDNS Recursor 4.1.8, fixing a minor security issue
that we recently discovered, affecting PowerDNS Recursor from 4.1.0 up
to and including 4.1.7.
The issue is that a remote attacker can trigger an out-of-bounds memory
read via a crafted query, while computing the hash of the query for a
packet cache lookup, possibly leading to a crash.
When the PowerDNS Recursor is run inside a supervisor like supervisord
or systemd, a crash will lead to an automatic restart,
limiting the impact to a somewhat degraded service.
This issue has been assigned CVE-2018-16855 by Red Hat.
The full security advisory is provided below, and can also be
found at
https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2018-09.html
A minimal patch can also be found here:
https://downloads.powerdns.com/patches/2018-09/
Please feel free to contact me directly if you have any question.
Best regards,
Remi Gacogne
PowerDNS.COM BV - https://www.powerdns.com/
PowerDNS Security Advisory 2018-09: Crafted query can cause a denial of
service
===============================================================================
- CVE: CVE-2018-16855
- Date: 26th of November 2018
- Affects: PowerDNS Recursor from 4.1.0 up to and including 4.1.7
- Not affected: 4.0.x, 4.1.8
- Severity: Medium
- Impact: Denial of service
- Exploit: This problem can be triggered via crafted queries
- Risk of system compromise: No
- Solution: Upgrade to a non-affected version
An issue has been found in PowerDNS Recursor where a remote attacker
sending a DNS query can trigger an out-of-bounds memory read while
computing the hash of the query for a packet cache lookup, possibly
leading to a crash.
This issue has been assigned CVE-2018-16855 by Red Hat.
When the PowerDNS Recursor is run inside a supervisor like supervisord
or systemd, a crash will lead to an automatic restart, limiting the
impact to a somewhat degraded service.
PowerDNS Recursor from 4.1.0 up to and including 4.1.7 is affected.
["signature.asc" (application/pgp-signature)]
[prev in list] [next in list] [prev in thread] [next in thread]
Configure |
About |
News |
Add a list |
Sponsored by KoreLogic