The DNS packet parsing/generation code in PowerDNS (aka pdns) Authoritative Server 3.4.x before 3.4.6 allows remote attackers to cause a denial of service (crash) via crafted query packets.
References
Link | Resource |
---|---|
http://www.debian.org/security/2015/dsa-3347 | Third Party Advisory |
http://www.securitytracker.com/id/1033475 | Third Party Advisory VDB Entry |
https://doc.powerdns.com/md/security/powerdns-advisory-2015-02/ | Vendor Advisory |
http://www.debian.org/security/2015/dsa-3347 | Third Party Advisory |
http://www.securitytracker.com/id/1033475 | Third Party Advisory VDB Entry |
https://doc.powerdns.com/md/security/powerdns-advisory-2015-02/ | Vendor Advisory |
Configurations
History
21 Nov 2024, 02:32
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.debian.org/security/2015/dsa-3347 - Third Party Advisory | |
References | () http://www.securitytracker.com/id/1033475 - Third Party Advisory, VDB Entry | |
References | () https://doc.powerdns.com/md/security/powerdns-advisory-2015-02/ - Vendor Advisory |
Information
Published : 2020-01-15 17:15
Updated : 2024-11-21 02:32
NVD link : CVE-2015-5230
Mitre link : CVE-2015-5230
CVE.ORG link : CVE-2015-5230
JSON object : View
Products Affected
debian
- debian_linux
powerdns
- authoritative
CWE
CWE-20
Improper Input Validation