An issue has been found in PowerDNS Authoritative Server versions up to and including 3.4.10, 4.0.1 allowing an authorized user to crash the server by inserting a specially crafted record in a zone under their control then sending a DNS query for that record. The issue is due to an integer overflow when checking if the content of the record matches the expected size, allowing an attacker to cause a read past the buffer boundary.
Advisories
Source ID Title
Debian DLA Debian DLA DLA-798-1 pdns security update
Debian DSA Debian DSA DSA-3764-1 pdns security update
EUVD EUVD EUVD-2016-3223 An issue has been found in PowerDNS Authoritative Server versions up to and including 3.4.10, 4.0.1 allowing an authorized user to crash the server by inserting a specially crafted record in a zone under their control then sending a DNS query for that record. The issue is due to an integer overflow when checking if the content of the record matches the expected size, allowing an attacker to cause a read past the buffer boundary.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2024-08-05T23:17:50.591Z

Reserved: 2016-01-29T00:00:00

Link: CVE-2016-2120

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2018-11-01T13:29:00.253

Modified: 2024-11-21T02:47:52.380

Link: CVE-2016-2120

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses