Powerdns

Authoritative

26 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.02%
  • Veröffentlicht 22.04.2026 14:16:55
  • Zuletzt bearbeitet 12.05.2026 20:16:46

An operator allowed to use the REST API can cause the Authoritative server to produce invalid HTTPS or SVCB record data, which can in turn cause LMDB database corruption, if using the LMDB backend.

  • EPSS 0.02%
  • Veröffentlicht 22.04.2026 14:16:54
  • Zuletzt bearbeitet 24.04.2026 18:53:08

A rogue primary server may cause file descriptor exhaustion and eventually a denial of service, when a PowerDNS secondary server forwards a DNS update request to it.

  • EPSS 0.01%
  • Veröffentlicht 22.04.2026 14:16:54
  • Zuletzt bearbeitet 24.04.2026 18:52:54

Incomplete escaping of LDAP queries when running with 8bit-dns enabled allows users to perform queries of internal domain subtrees.

  • EPSS 0.01%
  • Veröffentlicht 22.04.2026 14:16:54
  • Zuletzt bearbeitet 24.04.2026 18:52:44

An attacker can send a notify request that causes a new secondary domain to be added to the bind backend, but causes said backend to update its configuration to an invalid one, leading to the backend no longer able to run on the next restart, requiri...

  • EPSS 0.01%
  • Veröffentlicht 22.04.2026 10:16:51
  • Zuletzt bearbeitet 27.04.2026 17:03:22

An attacker can send a web request that causes unlimited memory allocation in the internal web server, leading to a denial of service. The internal web server is disabled by default.

  • EPSS 0.01%
  • Veröffentlicht 22.04.2026 10:16:51
  • Zuletzt bearbeitet 27.04.2026 17:03:56

An attacker can send a web request that causes unlimited memory allocation in the internal web server, leading to a denial of service. The internal web server is disabled by default.

  • EPSS 0.03%
  • Veröffentlicht 02.10.2020 09:15:13
  • Zuletzt bearbeitet 21.11.2024 05:15:49

An issue was discovered in PowerDNS Authoritative through 4.3.0 when --enable-experimental-gss-tsig is used. A remote, unauthenticated attacker might be able to cause a double-free, leading to a crash or possibly arbitrary code execution. by sending ...

  • EPSS 0.13%
  • Veröffentlicht 02.10.2020 09:15:13
  • Zuletzt bearbeitet 21.11.2024 05:15:49

An issue was discovered in PowerDNS Authoritative through 4.3.0 when --enable-experimental-gss-tsig is used. A remote, unauthenticated attacker can cause a denial of service by sending crafted queries with a GSS-TSIG signature.

  • EPSS 0.08%
  • Veröffentlicht 02.10.2020 09:15:13
  • Zuletzt bearbeitet 21.11.2024 05:15:49

An issue was discovered in PowerDNS Authoritative through 4.3.0 when --enable-experimental-gss-tsig is used. A remote, unauthenticated attacker can trigger a race condition leading to a crash, or possibly arbitrary code execution, by sending crafted ...

  • EPSS 0.05%
  • Veröffentlicht 02.10.2020 09:15:13
  • Zuletzt bearbeitet 21.11.2024 05:08:12

An issue has been found in PowerDNS Authoritative Server before 4.3.1 where an authorized user with the ability to insert crafted records into a zone might be able to leak the content of uninitialized memory.