CVE-2019-10162
Published: 30 July 2019
A vulnerability has been found in PowerDNS Authoritative Server before versions 4.1.10, 4.0.8 allowing an authorized user to cause the server to exit by inserting a crafted record in a MASTER type zone under their control. The issue is due to the fact that the Authoritative Server will exit when it runs into a parsing error while looking up the NS/A/AAAA records it is about to use for an outgoing notify.
Priority
CVSS 3 base score: 7.5
Status
Package | Release | Status |
---|---|---|
pdns Launchpad, Ubuntu, Debian |
bionic |
Needs triage
|
cosmic |
Ignored
(reached end-of-life)
|
|
disco |
Ignored
(reached end-of-life)
|
|
eoan |
Not vulnerable
(4.1.6-3build1)
|
|
focal |
Not vulnerable
(4.1.6-3build1)
|
|
groovy |
Not vulnerable
(4.1.6-3build1)
|
|
hirsute |
Not vulnerable
(4.1.6-3build1)
|
|
impish |
Not vulnerable
(4.1.6-3build1)
|
|
jammy |
Not vulnerable
(4.1.6-3build1)
|
|
precise |
Does not exist
|
|
trusty |
Does not exist
|
|
upstream |
Needs triage
|
|
xenial |
Ignored
(end of standard support, was needs-triage)
|