Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 146377 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.106238
Kategorie:Denial of Service
Titel:PowerDNS Authoritative Server DoS Vulnerabilities
Zusammenfassung:PowerDNS Authoritative Server is prone to two denial of service; vulnerabilities.
Beschreibung:Summary:
PowerDNS Authoritative Server is prone to two denial of service
vulnerabilities.

Vulnerability Insight:
Two issues have been found in PowerDNS Authoritative Server allowing a
remote, unauthenticated attacker to cause an abnormal load on the PowerDNS backend by sending crafted DNS
queries, which might result in a partial denial of service if the backend becomes overloaded. SQL backends for
example are particularly vulnerable to this kind of unexpected load if they have not been dimensioned for it.
The first issue is based on the fact that PowerDNS Authoritative Server accepts queries with a qname's length
larger than 255 bytes (CVE-2016-5426). The second issue is based on the fact that PowerDNS Authoritative Server
does not properly handle dot inside labels (CVE-2016-5427).

Vulnerability Impact:
A remote attacker may cause a partial DoS condition.

Affected Software/OS:
PowerDNS Authoritative Server 3.4.9 and prior.

Solution:
Upgrade to version 3.4.10 or later

CVSS Score:
5.0

CVSS Vector:
AV:N/AC:L/Au:N/C:N/I:N/A:P

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2016-5426
BugTraq ID: 92917
http://www.securityfocus.com/bid/92917
Debian Security Information: DSA-3664 (Google Search)
http://www.debian.org/security/2016/dsa-3664
http://www.openwall.com/lists/oss-security/2016/09/09/3
http://www.securitytracker.com/id/1036761
Common Vulnerability Exposure (CVE) ID: CVE-2016-5427
CopyrightCopyright (C) 2016 Greenbone AG

Dies ist nur einer von 146377 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.