Description
A vulnerability has been found in PowerDNS Authoritative Server before versions 4.1.10, 4.0.8 allowing an authorized user to cause the server to exit by inserting a crafted record in a MASTER type zone under their control. The issue is due to the fact that the Authoritative Server will exit when it runs into a parsing error while looking up the NS/A/AAAA records it is about to use for an outgoing notify.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-1843-1 | pdns security update |
Debian DSA |
DSA-4470-1 | pdns security update |
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-04T22:10:10.028Z
Reserved: 2019-03-27T00:00:00.000Z
Link: CVE-2019-10162
No data.
Status : Modified
Published: 2019-07-30T23:15:12.183
Modified: 2024-11-21T04:18:33.090
Link: CVE-2019-10162
No data.
OpenCVE Enrichment
No data.
Weaknesses
Debian DLA
Debian DSA