CVE-2019-10162
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
30/07/2019
Last modified:
02/10/2020
Description
A vulnerability has been found in PowerDNS Authoritative Server before versions 4.1.10, 4.0.8 allowing an authorized user to cause the server to exit by inserting a crafted record in a MASTER type zone under their control. The issue is due to the fact that the Authoritative Server will exit when it runs into a parsing error while looking up the NS/A/AAAA records it is about to use for an outgoing notify.
Impact
Base Score 3.x
7.50
Severity 3.x
HIGH
Base Score 2.0
5.00
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:powerdns:authoritative:*:*:*:*:*:*:*:* | 4.0.0 (including) | 4.0.8 (excluding) |
| cpe:2.3:a:powerdns:authoritative:*:*:*:*:*:*:*:* | 4.1.0 (including) | 4.1.10 (excluding) |
| cpe:2.3:a:powerdns:authoritative:4.0.0:-:*:*:*:*:*:* | ||
| cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:* | ||
| cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00036.html
- http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00054.html
- https://blog.powerdns.com/2019/06/21/powerdns-authoritative-server-4-0-8-and-4-1-10-released/
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10162
- https://doc.powerdns.com/authoritative/security-advisories/powerdns-advisory-2019-04.html



