Executive Summary
Summary | |
---|---|
Title | pdns security update |
Informations | |||
---|---|---|---|
Name | DSA-3764 | First vendor Publication | 2017-01-13 |
Vendor | Debian | Last vendor Modification | 2017-01-13 |
Severity (Vendor) | N/A | Revision | 1 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:N/I:N/A:C) | |||
---|---|---|---|
Cvss Base Score | 7.8 | Attack Range | Network |
Cvss Impact Score | 6.9 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Multiple vulnerabilities have been discovered in pdns, an authoritative DNS server. The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2016-2120 Mathieu Lafon discovered that pdns does not properly validate records in zones. An authorized user can take advantage of this flaw to crash server by inserting a specially crafted record in a zone under their control and then sending a DNS query for that record. CVE-2016-7068 Florian Heinz and Martin Kluge reported that pdns parses all records present in a query regardless of whether they are needed or even legitimate, allowing a remote, unauthenticated attacker to cause an abnormal CPU usage load on the pdns server, resulting in a partial denial of service if the system becomes overloaded. CVE-2016-7072 Mongo discovered that the webserver in pdns is susceptible to a denial-of-service vulnerability. A remote, unauthenticated attacker to cause a denial of service by opening a large number of f TCP connections to the web server. CVE-2016-7073 / CVE-2016-7074 Mongo discovered that pdns does not sufficiently validate TSIG signatures, allowing an attacker in position of man-in-the-middle to alter the content of an AXFR. For the stable distribution (jessie), these problems have been fixed in version 3.4.1-4+deb8u7. For the unstable distribution (sid), these problems have been fixed in version 4.0.2-1. We recommend that you upgrade your pdns packages. |
Original Source
Url : http://www.debian.org/security/2017/dsa-3764 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
40 % | CWE-400 | Uncontrolled Resource Consumption ('Resource Exhaustion') |
40 % | CWE-20 | Improper Input Validation |
20 % | CWE-190 | Integer Overflow or Wraparound (CWE/SANS Top 25) |
CPE : Common Platform Enumeration
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2017-01-31 | Name : The remote Fedora host is missing a security update. File : fedora_2017-bb0b9ddf27.nasl - Type : ACT_GATHER_INFO |
2017-01-30 | Name : The remote Fedora host is missing a security update. File : fedora_2017-cbd5501d31.nasl - Type : ACT_GATHER_INFO |
2017-01-26 | Name : The remote Debian host is missing a security update. File : debian_DLA-798.nasl - Type : ACT_GATHER_INFO |
2017-01-25 | Name : The remote Fedora host is missing a security update. File : fedora_2017-8308bc2a6e.nasl - Type : ACT_GATHER_INFO |
2017-01-25 | Name : The remote Fedora host is missing a security update. File : fedora_2017-c1ae4335e5.nasl - Type : ACT_GATHER_INFO |
2017-01-20 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2017-129.nasl - Type : ACT_GATHER_INFO |
2017-01-19 | Name : The remote FreeBSD host is missing one or more security-related updates. File : freebsd_pkg_e3200958dd6c11e6ae1b002590263bf5.nasl - Type : ACT_GATHER_INFO |
2017-01-18 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2017-112.nasl - Type : ACT_GATHER_INFO |
2017-01-16 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-3763.nasl - Type : ACT_GATHER_INFO |
2017-01-16 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-3764.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2018-11-17 05:19:52 |
|
2018-11-02 13:22:56 |
|
2018-09-11 17:21:50 |
|
2017-01-17 13:22:45 |
|
2017-01-13 21:22:51 |
|