Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 146377 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.147858
Kategorie:Denial of Service
Titel:PowerDNS Recursor DoS Vulnerability (2022-01)
Zusammenfassung:PowerDNS Recursor is prone to a denial of service (DoS); vulnerability.
Beschreibung:Summary:
PowerDNS Recursor is prone to a denial of service (DoS)
vulnerability.

Vulnerability Insight:
IXFR usually exchanges only the modifications between two
versions of a zone, but sometimes needs to fall back to a full transfer of the current version.
When IXFR falls back to a full zone transfer, an attacker in position of man-in-the-middle can
cause the transfer to be prematurely interrupted. This interrupted transfer is mistakenly
interpreted as a complete transfer, causing an incomplete zone to be processed.

Affected Software/OS:
PowerDNS Recursor version 4.4.7, 4.5.7 and 4.6.0.

Solution:
Update to version 4.4.8, 4.5.8, 4.6.1 or later.

CVSS Score:
4.3

CVSS Vector:
AV:N/AC:M/Au:N/C:N/I:N/A:P

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2022-27227
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZJSKICB67SPPEGNXCQLZVSWR6QGCN3KP/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HEABZA46XYEUWMGSY2GYYVHISBVWEHIO/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2QKN56VWXUVFOYGUN75N5IRNK66OHTHT/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IPHOFNI7FKM5NNOVDOWO4TBXFAFICCUE/
https://doc.powerdns.com/authoritative/security-advisories/index.html
https://docs.powerdns.com/recursor/security-advisories/index.html
http://www.openwall.com/lists/oss-security/2022/03/25/1
CopyrightCopyright (C) 2022 Greenbone Networks GmbH

Dies ist nur einer von 146377 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.