CVE-2022-37428
- EPSS 0.05%
- Veröffentlicht 23.08.2022 17:15:15
- Zuletzt bearbeitet 21.11.2024 07:14:58
PowerDNS Recursor up to and including 4.5.9, 4.6.2 and 4.7.1, when protobuf logging is enabled, has Improper Cleanup upon a Thrown Exception, leading to a denial of service (daemon crash) via a DNS query that leads to an answer with specific properti...
CVE-2022-27227
- EPSS 0.11%
- Veröffentlicht 25.03.2022 15:15:07
- Zuletzt bearbeitet 21.11.2024 06:55:27
In PowerDNS Authoritative Server before 4.4.3, 4.5.x before 4.5.4, and 4.6.x before 4.6.1 and PowerDNS Recursor before 4.4.8, 4.5.x before 4.5.8, and 4.6.x before 4.6.1, insufficient validation of an IXFR end condition causes incomplete zone transfer...
CVE-2020-25829
- EPSS 0.35%
- Veröffentlicht 16.10.2020 06:15:12
- Zuletzt bearbeitet 21.11.2024 05:18:51
An issue has been found in PowerDNS Recursor before 4.1.18, 4.2.x before 4.2.5, and 4.3.x before 4.3.5. A remote attacker can cause the cached records for a given name to be updated to the Bogus DNSSEC validation state, instead of their actual DNSSEC...
CVE-2020-14196
- EPSS 0.03%
- Veröffentlicht 01.07.2020 18:15:10
- Zuletzt bearbeitet 21.11.2024 05:02:50
In PowerDNS Recursor versions up to and including 4.3.1, 4.2.2 and 4.1.16, the ACL restricting access to the internal web server is not properly enforced.
CVE-2020-10995
- EPSS 0.09%
- Veröffentlicht 19.05.2020 17:15:10
- Zuletzt bearbeitet 21.11.2024 04:56:32
PowerDNS Recursor from 4.1.0 up to and including 4.3.0 does not sufficiently defend against amplification attacks. An issue in the DNS protocol has been found that allow malicious parties to use recursive DNS services to attack third party authoritat...
CVE-2020-10030
- EPSS 0.03%
- Veröffentlicht 19.05.2020 16:15:10
- Zuletzt bearbeitet 21.11.2024 04:54:41
An issue has been found in PowerDNS Recursor 4.1.0 up to and including 4.3.0. It allows an attacker (with enough privileges to change the system's hostname) to cause disclosure of uninitialized memory content via a stack-based out-of-bounds read. It ...
CVE-2020-12244
- EPSS 0.09%
- Veröffentlicht 19.05.2020 14:15:11
- Zuletzt bearbeitet 21.11.2024 04:59:22
An issue has been found in PowerDNS Recursor 4.1.0 through 4.3.0 where records in the answer section of a NXDOMAIN response lacking an SOA were not properly validated in SyncRes::processAnswer, allowing an attacker to bypass DNSSEC validation.
CVE-2019-3807
- EPSS 0%
- Veröffentlicht 29.01.2019 17:29:00
- Zuletzt bearbeitet 21.11.2024 04:42:34
An issue has been found in PowerDNS Recursor versions 4.1.x before 4.1.9 where records in the answer section of responses received from authoritative servers with the AA flag not set were not properly validated, allowing an attacker to bypass DNSSEC ...
CVE-2019-3806
- EPSS 0.02%
- Veröffentlicht 29.01.2019 17:29:00
- Zuletzt bearbeitet 21.11.2024 04:42:34
An issue has been found in PowerDNS Recursor versions after 4.1.3 before 4.1.9 where Lua hooks are not properly applied to queries received over TCP in some specific combination of settings, possibly bypassing security policies enforced using Lua.
CVE-2018-16855
- EPSS 19.83%
- Veröffentlicht 03.12.2018 14:29:00
- Zuletzt bearbeitet 21.11.2024 03:53:27
An issue has been found in PowerDNS Recursor before version 4.1.8 where a remote attacker sending a DNS query can trigger an out-of-bounds memory read while computing the hash of the query for a packet cache lookup, possibly leading to a crash.