Vulnerabilites related to PowerDNS - PowerDNS
CVE-2005-0428 (GCVE-0-2005-0428)
Vulnerability from cvelistv5
Published
2005-02-15 05:00
Modified
2024-08-07 21:13
Severity ?
CWE
  • n/a
Summary
The DNSPacket::expand method in dnspacket.cc in PowerDNS before 2.9.17 allows remote attackers to cause a denial of service by sending a random stream of bytes.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T21:13:54.257Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "powerdns-random-bytes-dos(19221)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19221"
          },
          {
            "name": "GLSA-200502-15",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://www.gentoo.org/security/en/glsa/glsa-200502-15.xml"
          },
          {
            "name": "12446",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/12446"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://doc.powerdns.com/changelog.html#CHANGELOG-2-9-17"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://ds9a.nl/cgi-bin/cvstrac/pdns/tktview?tn=21"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2005-02-13T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The DNSPacket::expand method in dnspacket.cc in PowerDNS before 2.9.17 allows remote attackers to cause a denial of service by sending a random stream of bytes."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-10T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "powerdns-random-bytes-dos(19221)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19221"
        },
        {
          "name": "GLSA-200502-15",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://www.gentoo.org/security/en/glsa/glsa-200502-15.xml"
        },
        {
          "name": "12446",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/12446"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://doc.powerdns.com/changelog.html#CHANGELOG-2-9-17"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://ds9a.nl/cgi-bin/cvstrac/pdns/tktview?tn=21"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2005-0428",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The DNSPacket::expand method in dnspacket.cc in PowerDNS before 2.9.17 allows remote attackers to cause a denial of service by sending a random stream of bytes."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "powerdns-random-bytes-dos(19221)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19221"
            },
            {
              "name": "GLSA-200502-15",
              "refsource": "GENTOO",
              "url": "http://www.gentoo.org/security/en/glsa/glsa-200502-15.xml"
            },
            {
              "name": "12446",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/12446"
            },
            {
              "name": "http://doc.powerdns.com/changelog.html#CHANGELOG-2-9-17",
              "refsource": "CONFIRM",
              "url": "http://doc.powerdns.com/changelog.html#CHANGELOG-2-9-17"
            },
            {
              "name": "http://ds9a.nl/cgi-bin/cvstrac/pdns/tktview?tn=21",
              "refsource": "MISC",
              "url": "http://ds9a.nl/cgi-bin/cvstrac/pdns/tktview?tn=21"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2005-0428",
    "datePublished": "2005-02-15T05:00:00",
    "dateReserved": "2005-02-15T00:00:00",
    "dateUpdated": "2024-08-07T21:13:54.257Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2005-2301 (GCVE-0-2005-2301)
Vulnerability from cvelistv5
Published
2005-07-19 04:00
Modified
2024-08-07 22:22
Severity ?
CWE
  • n/a
Summary
PowerDNS before 2.9.18, when running with an LDAP backend, does not properly escape LDAP queries, which allows remote attackers to cause a denial of service (failure to answer ldap questions) and possibly conduct an LDAP injection attack.
References
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T22:22:48.596Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://doc.powerdns.com/changelog.html#CHANGELOG-2-9-18"
          },
          {
            "name": "SUSE-SR:2005:019",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://www.novell.com/linux/security/advisories/2005_19_sr.html"
          },
          {
            "name": "20050716 PowerDNS 2.9.18 fixes two security issues affecting users of LDAP",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=112155941310297\u0026w=2"
          },
          {
            "name": "1014504",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1014504"
          },
          {
            "name": "14290",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/14290"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2005-07-16T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "PowerDNS before 2.9.18, when running with an LDAP backend, does not properly escape LDAP queries, which allows remote attackers to cause a denial of service (failure to answer ldap questions) and possibly conduct an LDAP injection attack."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2016-10-17T13:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://doc.powerdns.com/changelog.html#CHANGELOG-2-9-18"
        },
        {
          "name": "SUSE-SR:2005:019",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://www.novell.com/linux/security/advisories/2005_19_sr.html"
        },
        {
          "name": "20050716 PowerDNS 2.9.18 fixes two security issues affecting users of LDAP",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=112155941310297\u0026w=2"
        },
        {
          "name": "1014504",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1014504"
        },
        {
          "name": "14290",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/14290"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2005-2301",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "PowerDNS before 2.9.18, when running with an LDAP backend, does not properly escape LDAP queries, which allows remote attackers to cause a denial of service (failure to answer ldap questions) and possibly conduct an LDAP injection attack."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://doc.powerdns.com/changelog.html#CHANGELOG-2-9-18",
              "refsource": "CONFIRM",
              "url": "http://doc.powerdns.com/changelog.html#CHANGELOG-2-9-18"
            },
            {
              "name": "SUSE-SR:2005:019",
              "refsource": "SUSE",
              "url": "http://www.novell.com/linux/security/advisories/2005_19_sr.html"
            },
            {
              "name": "20050716 PowerDNS 2.9.18 fixes two security issues affecting users of LDAP",
              "refsource": "BUGTRAQ",
              "url": "http://marc.info/?l=bugtraq\u0026m=112155941310297\u0026w=2"
            },
            {
              "name": "1014504",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1014504"
            },
            {
              "name": "14290",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/14290"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2005-2301",
    "datePublished": "2005-07-19T04:00:00",
    "dateReserved": "2005-07-19T00:00:00",
    "dateUpdated": "2024-08-07T22:22:48.596Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2017-15090 (GCVE-0-2017-15090)
Vulnerability from cvelistv5
Published
2018-01-23 15:00
Modified
2024-09-16 18:38
Severity ?
CWE
Summary
An issue has been found in the DNSSEC validation component of PowerDNS Recursor from 4.0.0 and up to and including 4.0.6, where the signatures might have been accepted as valid even if the signed data was not in bailiwick of the DNSKEY used to sign it. This allows an attacker in position of man-in-the-middle to alter the content of records by issuing a valid signature for the crafted records.
Impacted products
Vendor Product Version
PowerDNS PowerDNS Version: from 4.0.0 and up to and including 4.0.6
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T19:50:14.915Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://doc.powerdns.com/recursor/security-advisories/powerdns-advisory-2017-03.html"
          },
          {
            "name": "101982",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/101982"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "PowerDNS",
          "vendor": "PowerDNS",
          "versions": [
            {
              "status": "affected",
              "version": "from 4.0.0 and up to and including 4.0.6"
            }
          ]
        }
      ],
      "datePublic": "2017-11-27T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "An issue has been found in the DNSSEC validation component of PowerDNS Recursor from 4.0.0 and up to and including 4.0.6, where the signatures might have been accepted as valid even if the signed data was not in bailiwick of the DNSKEY used to sign it. This allows an attacker in position of man-in-the-middle to alter the content of records by issuing a valid signature for the crafted records."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-347",
              "description": "CWE-347",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-01-24T10:57:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://doc.powerdns.com/recursor/security-advisories/powerdns-advisory-2017-03.html"
        },
        {
          "name": "101982",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/101982"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert@redhat.com",
          "DATE_PUBLIC": "2017-11-27T00:00:00",
          "ID": "CVE-2017-15090",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "PowerDNS",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "from 4.0.0 and up to and including 4.0.6"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "PowerDNS"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "An issue has been found in the DNSSEC validation component of PowerDNS Recursor from 4.0.0 and up to and including 4.0.6, where the signatures might have been accepted as valid even if the signed data was not in bailiwick of the DNSKEY used to sign it. This allows an attacker in position of man-in-the-middle to alter the content of records by issuing a valid signature for the crafted records."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-347"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://doc.powerdns.com/recursor/security-advisories/powerdns-advisory-2017-03.html",
              "refsource": "CONFIRM",
              "url": "https://doc.powerdns.com/recursor/security-advisories/powerdns-advisory-2017-03.html"
            },
            {
              "name": "101982",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/101982"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2017-15090",
    "datePublished": "2018-01-23T15:00:00Z",
    "dateReserved": "2017-10-08T00:00:00",
    "dateUpdated": "2024-09-16T18:38:21.212Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2005-0038 (GCVE-0-2005-0038)
Vulnerability from cvelistv5
Published
2006-04-28 01:00
Modified
2024-08-07 20:57
Severity ?
CWE
  • n/a
Summary
The DNS implementation of PowerDNS 2.9.16 and earlier allows remote attackers to cause a denial of service via a compressed DNS packet with a label length byte with an incorrect offset, which could trigger an infinite loop.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T20:57:40.965Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "13729",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/13729"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.niscc.gov.uk/niscc/docs/re-20050524-00432.pdf?lang=en"
          },
          {
            "name": "25291",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/25291"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.niscc.gov.uk/niscc/docs/al-20050524-00433.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2005-05-24T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The DNS implementation of PowerDNS 2.9.16 and earlier allows remote attackers to cause a denial of service via a compressed DNS packet with a label length byte with an incorrect offset, which could trigger an infinite loop."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2006-06-05T09:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "13729",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/13729"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.niscc.gov.uk/niscc/docs/re-20050524-00432.pdf?lang=en"
        },
        {
          "name": "25291",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/25291"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.niscc.gov.uk/niscc/docs/al-20050524-00433.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2005-0038",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The DNS implementation of PowerDNS 2.9.16 and earlier allows remote attackers to cause a denial of service via a compressed DNS packet with a label length byte with an incorrect offset, which could trigger an infinite loop."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "13729",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/13729"
            },
            {
              "name": "http://www.niscc.gov.uk/niscc/docs/re-20050524-00432.pdf?lang=en",
              "refsource": "MISC",
              "url": "http://www.niscc.gov.uk/niscc/docs/re-20050524-00432.pdf?lang=en"
            },
            {
              "name": "25291",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/25291"
            },
            {
              "name": "http://www.niscc.gov.uk/niscc/docs/al-20050524-00433.html",
              "refsource": "MISC",
              "url": "http://www.niscc.gov.uk/niscc/docs/al-20050524-00433.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2005-0038",
    "datePublished": "2006-04-28T01:00:00",
    "dateReserved": "2005-01-07T00:00:00",
    "dateUpdated": "2024-08-07T20:57:40.965Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2008-3337 (GCVE-0-2008-3337)
Vulnerability from cvelistv5
Published
2008-08-08 19:00
Modified
2024-08-07 09:37
Severity ?
CWE
  • n/a
Summary
PowerDNS Authoritative Server before 2.9.21.1 drops malformed queries, which might make it easier for remote attackers to poison DNS caches of other products running on other servers, a different issue than CVE-2008-1447 and CVE-2008-3217.
References
http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html vendor-advisory, x_refsource_SUSE
https://www.redhat.com/archives/fedora-package-announce/2008-August/msg00109.html vendor-advisory, x_refsource_FEDORA
http://secunia.com/advisories/31401 third-party-advisory, x_refsource_SECUNIA
http://www.securityfocus.com/bid/30587 vdb-entry, x_refsource_BID
http://secunia.com/advisories/31687 third-party-advisory, x_refsource_SECUNIA
http://doc.powerdns.com/changelog.html x_refsource_CONFIRM
http://secunia.com/advisories/31448 third-party-advisory, x_refsource_SECUNIA
https://www.debian.org/security/2008/dsa-1628 vendor-advisory, x_refsource_DEBIAN
http://doc.powerdns.com/powerdns-advisory-2008-02.html x_refsource_CONFIRM
http://secunia.com/advisories/33264 third-party-advisory, x_refsource_SECUNIA
https://www.redhat.com/archives/fedora-package-announce/2008-August/msg00140.html vendor-advisory, x_refsource_FEDORA
http://mailman.powerdns.com/pipermail/pdns-users/2008-August/005646.html mailing-list, x_refsource_MLIST
https://exchange.xforce.ibmcloud.com/vulnerabilities/44253 vdb-entry, x_refsource_XF
http://security.gentoo.org/glsa/glsa-200812-19.xml vendor-advisory, x_refsource_GENTOO
http://secunia.com/advisories/31407 third-party-advisory, x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2008/2320 vdb-entry, x_refsource_VUPEN
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T09:37:26.688Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "SUSE-SR:2008:017",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html"
          },
          {
            "name": "FEDORA-2008-7048",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://www.redhat.com/archives/fedora-package-announce/2008-August/msg00109.html"
          },
          {
            "name": "31401",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/31401"
          },
          {
            "name": "30587",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/30587"
          },
          {
            "name": "31687",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/31687"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://doc.powerdns.com/changelog.html"
          },
          {
            "name": "31448",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/31448"
          },
          {
            "name": "DSA-1628",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "https://www.debian.org/security/2008/dsa-1628"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://doc.powerdns.com/powerdns-advisory-2008-02.html"
          },
          {
            "name": "33264",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/33264"
          },
          {
            "name": "FEDORA-2008-7083",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://www.redhat.com/archives/fedora-package-announce/2008-August/msg00140.html"
          },
          {
            "name": "[pdns-users] 20080806 Security update: PowerDNS Authoritative Server 2.9.21.1 released",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://mailman.powerdns.com/pipermail/pdns-users/2008-August/005646.html"
          },
          {
            "name": "powerdns-query-weak-security(44253)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44253"
          },
          {
            "name": "GLSA-200812-19",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-200812-19.xml"
          },
          {
            "name": "31407",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/31407"
          },
          {
            "name": "ADV-2008-2320",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2008/2320"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2008-08-06T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "PowerDNS Authoritative Server before 2.9.21.1 drops malformed queries, which might make it easier for remote attackers to poison DNS caches of other products running on other servers, a different issue than CVE-2008-1447 and CVE-2008-3217."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-07T12:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "SUSE-SR:2008:017",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html"
        },
        {
          "name": "FEDORA-2008-7048",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://www.redhat.com/archives/fedora-package-announce/2008-August/msg00109.html"
        },
        {
          "name": "31401",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/31401"
        },
        {
          "name": "30587",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/30587"
        },
        {
          "name": "31687",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/31687"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://doc.powerdns.com/changelog.html"
        },
        {
          "name": "31448",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/31448"
        },
        {
          "name": "DSA-1628",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "https://www.debian.org/security/2008/dsa-1628"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://doc.powerdns.com/powerdns-advisory-2008-02.html"
        },
        {
          "name": "33264",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/33264"
        },
        {
          "name": "FEDORA-2008-7083",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://www.redhat.com/archives/fedora-package-announce/2008-August/msg00140.html"
        },
        {
          "name": "[pdns-users] 20080806 Security update: PowerDNS Authoritative Server 2.9.21.1 released",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://mailman.powerdns.com/pipermail/pdns-users/2008-August/005646.html"
        },
        {
          "name": "powerdns-query-weak-security(44253)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44253"
        },
        {
          "name": "GLSA-200812-19",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://security.gentoo.org/glsa/glsa-200812-19.xml"
        },
        {
          "name": "31407",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/31407"
        },
        {
          "name": "ADV-2008-2320",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2008/2320"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2008-3337",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "PowerDNS Authoritative Server before 2.9.21.1 drops malformed queries, which might make it easier for remote attackers to poison DNS caches of other products running on other servers, a different issue than CVE-2008-1447 and CVE-2008-3217."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "SUSE-SR:2008:017",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html"
            },
            {
              "name": "FEDORA-2008-7048",
              "refsource": "FEDORA",
              "url": "https://www.redhat.com/archives/fedora-package-announce/2008-August/msg00109.html"
            },
            {
              "name": "31401",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/31401"
            },
            {
              "name": "30587",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/30587"
            },
            {
              "name": "31687",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/31687"
            },
            {
              "name": "http://doc.powerdns.com/changelog.html",
              "refsource": "CONFIRM",
              "url": "http://doc.powerdns.com/changelog.html"
            },
            {
              "name": "31448",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/31448"
            },
            {
              "name": "DSA-1628",
              "refsource": "DEBIAN",
              "url": "https://www.debian.org/security/2008/dsa-1628"
            },
            {
              "name": "http://doc.powerdns.com/powerdns-advisory-2008-02.html",
              "refsource": "CONFIRM",
              "url": "http://doc.powerdns.com/powerdns-advisory-2008-02.html"
            },
            {
              "name": "33264",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/33264"
            },
            {
              "name": "FEDORA-2008-7083",
              "refsource": "FEDORA",
              "url": "https://www.redhat.com/archives/fedora-package-announce/2008-August/msg00140.html"
            },
            {
              "name": "[pdns-users] 20080806 Security update: PowerDNS Authoritative Server 2.9.21.1 released",
              "refsource": "MLIST",
              "url": "http://mailman.powerdns.com/pipermail/pdns-users/2008-August/005646.html"
            },
            {
              "name": "powerdns-query-weak-security(44253)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44253"
            },
            {
              "name": "GLSA-200812-19",
              "refsource": "GENTOO",
              "url": "http://security.gentoo.org/glsa/glsa-200812-19.xml"
            },
            {
              "name": "31407",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/31407"
            },
            {
              "name": "ADV-2008-2320",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2008/2320"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2008-3337",
    "datePublished": "2008-08-08T19:00:00",
    "dateReserved": "2008-07-27T00:00:00",
    "dateUpdated": "2024-08-07T09:37:26.688Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2005-2302 (GCVE-0-2005-2302)
Vulnerability from cvelistv5
Published
2005-07-19 04:00
Modified
2024-08-07 22:22
Severity ?
CWE
  • n/a
Summary
PowerDNS before 2.9.18, when allowing recursion to a restricted range of IP addresses, does not properly handle questions from clients that are denied recursion, which could cause a "blank out" of answers to those clients that are allowed to use recursion.
References
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T22:22:48.406Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://doc.powerdns.com/changelog.html#CHANGELOG-2-9-18"
          },
          {
            "name": "SUSE-SR:2005:019",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://www.novell.com/linux/security/advisories/2005_19_sr.html"
          },
          {
            "name": "20050716 PowerDNS 2.9.18 fixes two security issues affecting users of LDAP",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=112155941310297\u0026w=2"
          },
          {
            "name": "1014504",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1014504"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2005-07-16T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "PowerDNS before 2.9.18, when allowing recursion to a restricted range of IP addresses, does not properly handle questions from clients that are denied recursion, which could cause a \"blank out\" of answers to those clients that are allowed to use recursion."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2016-10-17T13:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://doc.powerdns.com/changelog.html#CHANGELOG-2-9-18"
        },
        {
          "name": "SUSE-SR:2005:019",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://www.novell.com/linux/security/advisories/2005_19_sr.html"
        },
        {
          "name": "20050716 PowerDNS 2.9.18 fixes two security issues affecting users of LDAP",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=112155941310297\u0026w=2"
        },
        {
          "name": "1014504",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1014504"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2005-2302",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "PowerDNS before 2.9.18, when allowing recursion to a restricted range of IP addresses, does not properly handle questions from clients that are denied recursion, which could cause a \"blank out\" of answers to those clients that are allowed to use recursion."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://doc.powerdns.com/changelog.html#CHANGELOG-2-9-18",
              "refsource": "CONFIRM",
              "url": "http://doc.powerdns.com/changelog.html#CHANGELOG-2-9-18"
            },
            {
              "name": "SUSE-SR:2005:019",
              "refsource": "SUSE",
              "url": "http://www.novell.com/linux/security/advisories/2005_19_sr.html"
            },
            {
              "name": "20050716 PowerDNS 2.9.18 fixes two security issues affecting users of LDAP",
              "refsource": "BUGTRAQ",
              "url": "http://marc.info/?l=bugtraq\u0026m=112155941310297\u0026w=2"
            },
            {
              "name": "1014504",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1014504"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2005-2302",
    "datePublished": "2005-07-19T04:00:00",
    "dateReserved": "2005-07-19T00:00:00",
    "dateUpdated": "2024-08-07T22:22:48.406Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2006-2069 (GCVE-0-2006-2069)
Vulnerability from cvelistv5
Published
2006-04-27 10:00
Modified
2024-08-07 17:35
Severity ?
CWE
  • n/a
Summary
The recursor in PowerDNS before 3.0.1 allows remote attackers to cause a denial of service (application crash) via malformed EDNS0 packets.
References
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T17:35:31.238Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "17711",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/17711"
          },
          {
            "name": "powerdns-recursor-ednso-dos(26100)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26100"
          },
          {
            "name": "19831",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/19831"
          },
          {
            "name": "SUSE-SR:2006:010",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.suse.com/archive/suse-security-announce/2006-May/0004.html"
          },
          {
            "name": "20117",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/20117"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://doc.powerdns.com/changelog.html#CHANGELOG-RECURSOR-3-0-1"
          },
          {
            "name": "ADV-2006-1527",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/1527"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2006-04-25T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The recursor in PowerDNS before 3.0.1 allows remote attackers to cause a denial of service (application crash) via malformed EDNS0 packets."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-19T15:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "17711",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/17711"
        },
        {
          "name": "powerdns-recursor-ednso-dos(26100)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26100"
        },
        {
          "name": "19831",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/19831"
        },
        {
          "name": "SUSE-SR:2006:010",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.suse.com/archive/suse-security-announce/2006-May/0004.html"
        },
        {
          "name": "20117",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/20117"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://doc.powerdns.com/changelog.html#CHANGELOG-RECURSOR-3-0-1"
        },
        {
          "name": "ADV-2006-1527",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/1527"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2006-2069",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The recursor in PowerDNS before 3.0.1 allows remote attackers to cause a denial of service (application crash) via malformed EDNS0 packets."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "17711",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/17711"
            },
            {
              "name": "powerdns-recursor-ednso-dos(26100)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26100"
            },
            {
              "name": "19831",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/19831"
            },
            {
              "name": "SUSE-SR:2006:010",
              "refsource": "SUSE",
              "url": "http://lists.suse.com/archive/suse-security-announce/2006-May/0004.html"
            },
            {
              "name": "20117",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/20117"
            },
            {
              "name": "http://doc.powerdns.com/changelog.html#CHANGELOG-RECURSOR-3-0-1",
              "refsource": "CONFIRM",
              "url": "http://doc.powerdns.com/changelog.html#CHANGELOG-RECURSOR-3-0-1"
            },
            {
              "name": "ADV-2006-1527",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/1527"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2006-2069",
    "datePublished": "2006-04-27T10:00:00",
    "dateReserved": "2006-04-26T00:00:00",
    "dateUpdated": "2024-08-07T17:35:31.238Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2008-5277 (GCVE-0-2008-5277)
Vulnerability from cvelistv5
Published
2008-12-09 00:00
Modified
2024-08-07 10:49
Severity ?
CWE
  • n/a
Summary
PowerDNS before 2.9.21.2 allows remote attackers to cause a denial of service (daemon crash) via a CH HINFO query.
References
http://doc.powerdns.com/powerdns-advisory-2008-03.html x_refsource_CONFIRM
http://securitytracker.com/id?1021304 vdb-entry, x_refsource_SECTRACK
http://secunia.com/advisories/33264 third-party-advisory, x_refsource_SECUNIA
https://exchange.xforce.ibmcloud.com/vulnerabilities/47076 vdb-entry, x_refsource_XF
http://lists.opensuse.org/opensuse-security-announce/2008-12/msg00002.html vendor-advisory, x_refsource_SUSE
http://www.securityfocus.com/bid/32627 vdb-entry, x_refsource_BID
http://secunia.com/advisories/32979 third-party-advisory, x_refsource_SECUNIA
http://security.gentoo.org/glsa/glsa-200812-19.xml vendor-advisory, x_refsource_GENTOO
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T10:49:11.870Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://doc.powerdns.com/powerdns-advisory-2008-03.html"
          },
          {
            "name": "1021304",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1021304"
          },
          {
            "name": "33264",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/33264"
          },
          {
            "name": "powerdns-chhinfo-dos(47076)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47076"
          },
          {
            "name": "SUSE-SR:2008:027",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2008-12/msg00002.html"
          },
          {
            "name": "32627",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/32627"
          },
          {
            "name": "32979",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/32979"
          },
          {
            "name": "GLSA-200812-19",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-200812-19.xml"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2008-12-04T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "PowerDNS before 2.9.21.2 allows remote attackers to cause a denial of service (daemon crash) via a CH HINFO query."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-07T12:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://doc.powerdns.com/powerdns-advisory-2008-03.html"
        },
        {
          "name": "1021304",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1021304"
        },
        {
          "name": "33264",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/33264"
        },
        {
          "name": "powerdns-chhinfo-dos(47076)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47076"
        },
        {
          "name": "SUSE-SR:2008:027",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2008-12/msg00002.html"
        },
        {
          "name": "32627",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/32627"
        },
        {
          "name": "32979",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/32979"
        },
        {
          "name": "GLSA-200812-19",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://security.gentoo.org/glsa/glsa-200812-19.xml"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2008-5277",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "PowerDNS before 2.9.21.2 allows remote attackers to cause a denial of service (daemon crash) via a CH HINFO query."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://doc.powerdns.com/powerdns-advisory-2008-03.html",
              "refsource": "CONFIRM",
              "url": "http://doc.powerdns.com/powerdns-advisory-2008-03.html"
            },
            {
              "name": "1021304",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1021304"
            },
            {
              "name": "33264",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/33264"
            },
            {
              "name": "powerdns-chhinfo-dos(47076)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47076"
            },
            {
              "name": "SUSE-SR:2008:027",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2008-12/msg00002.html"
            },
            {
              "name": "32627",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/32627"
            },
            {
              "name": "32979",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/32979"
            },
            {
              "name": "GLSA-200812-19",
              "refsource": "GENTOO",
              "url": "http://security.gentoo.org/glsa/glsa-200812-19.xml"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2008-5277",
    "datePublished": "2008-12-09T00:00:00",
    "dateReserved": "2008-11-28T00:00:00",
    "dateUpdated": "2024-08-07T10:49:11.870Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

Vulnerability from fkie_nvd
Published
2005-07-19 04:00
Modified
2025-04-03 01:03
Severity ?
Summary
PowerDNS before 2.9.18, when running with an LDAP backend, does not properly escape LDAP queries, which allows remote attackers to cause a denial of service (failure to answer ldap questions) and possibly conduct an LDAP injection attack.
Impacted products



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:powerdns:powerdns:2.9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C1E89A2-4993-4208-B67F-52B08A6F1BDF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:powerdns:powerdns:2.9.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B340CA64-2358-46E6-8F65-725B6ACE77D3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:powerdns:powerdns:2.9.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "8ADBB8B1-C732-49BA-9270-F5551A9E2D0D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:powerdns:powerdns:2.9.3a:*:*:*:*:*:*:*",
              "matchCriteriaId": "80C62126-2E61-4532-BFA2-D66FCCC8C9E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:powerdns:powerdns:2.9.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "4472A3D7-8E17-4D80-AA2D-724C74EEF9E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:powerdns:powerdns:2.9.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "07CDE603-2A52-4C6F-B6A3-563D516BB4C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:powerdns:powerdns:2.9.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC3E5668-9B66-4C80-8C38-6FF01C342182",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:powerdns:powerdns:2.9.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB793844-A30A-4F97-954B-690083E77430",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:powerdns:powerdns:2.9.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "B636157B-E627-4EF1-B6C2-640648C001D2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:powerdns:powerdns:2.9.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "34EEA40F-CD68-4AE9-A305-402BFBEEA23B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:powerdns:powerdns:2.9.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "40FFBCCC-3595-4148-A3CD-28FD390FB786",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:powerdns:powerdns:2.9.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B7722F1-D913-42A0-93EA-48140F47F221",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:powerdns:powerdns:2.9.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "16E26E04-71AA-4A00-B0EE-9A04A63ADBBE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:powerdns:powerdns:2.9.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A413F4D-123A-4AA6-A097-9900F9B39817",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:powerdns:powerdns:2.9.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F03070D-C76A-4A31-AA0C-E32442EBE83B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:powerdns:powerdns:2.9.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2BE9083-C8DA-4CCB-AAA0-8E31A1C566D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:powerdns:powerdns:2.9.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "11FC77A2-E464-4832-ADCD-68D66E7CB29E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "PowerDNS before 2.9.18, when running with an LDAP backend, does not properly escape LDAP queries, which allows remote attackers to cause a denial of service (failure to answer ldap questions) and possibly conduct an LDAP injection attack."
    },
    {
      "lang": "es",
      "value": "PowerDNS anterior a la 2.9.18, cuando se ejecuta en LDAP, no escapa adecuadamente las peticiones LDAP, lo que permite que atacantes remotos causen una denegaci\u00f3n de servicio."
    }
  ],
  "id": "CVE-2005-2301",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2005-07-19T04:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://doc.powerdns.com/changelog.html#CHANGELOG-2-9-18"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://marc.info/?l=bugtraq\u0026m=112155941310297\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securitytracker.com/id?1014504"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.novell.com/linux/security/advisories/2005_19_sr.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/14290"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://doc.powerdns.com/changelog.html#CHANGELOG-2-9-18"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=bugtraq\u0026m=112155941310297\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1014504"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.novell.com/linux/security/advisories/2005_19_sr.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/14290"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2005-07-19 04:00
Modified
2025-04-03 01:03
Severity ?
Summary
PowerDNS before 2.9.18, when allowing recursion to a restricted range of IP addresses, does not properly handle questions from clients that are denied recursion, which could cause a "blank out" of answers to those clients that are allowed to use recursion.
Impacted products



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:powerdns:powerdns:2.9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C1E89A2-4993-4208-B67F-52B08A6F1BDF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:powerdns:powerdns:2.9.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B340CA64-2358-46E6-8F65-725B6ACE77D3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:powerdns:powerdns:2.9.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "8ADBB8B1-C732-49BA-9270-F5551A9E2D0D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:powerdns:powerdns:2.9.3a:*:*:*:*:*:*:*",
              "matchCriteriaId": "80C62126-2E61-4532-BFA2-D66FCCC8C9E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:powerdns:powerdns:2.9.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "4472A3D7-8E17-4D80-AA2D-724C74EEF9E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:powerdns:powerdns:2.9.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "07CDE603-2A52-4C6F-B6A3-563D516BB4C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:powerdns:powerdns:2.9.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC3E5668-9B66-4C80-8C38-6FF01C342182",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:powerdns:powerdns:2.9.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB793844-A30A-4F97-954B-690083E77430",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:powerdns:powerdns:2.9.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "B636157B-E627-4EF1-B6C2-640648C001D2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:powerdns:powerdns:2.9.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "34EEA40F-CD68-4AE9-A305-402BFBEEA23B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:powerdns:powerdns:2.9.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "40FFBCCC-3595-4148-A3CD-28FD390FB786",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:powerdns:powerdns:2.9.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B7722F1-D913-42A0-93EA-48140F47F221",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:powerdns:powerdns:2.9.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "16E26E04-71AA-4A00-B0EE-9A04A63ADBBE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:powerdns:powerdns:2.9.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A413F4D-123A-4AA6-A097-9900F9B39817",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:powerdns:powerdns:2.9.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F03070D-C76A-4A31-AA0C-E32442EBE83B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:powerdns:powerdns:2.9.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2BE9083-C8DA-4CCB-AAA0-8E31A1C566D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:powerdns:powerdns:2.9.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "11FC77A2-E464-4832-ADCD-68D66E7CB29E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "PowerDNS before 2.9.18, when allowing recursion to a restricted range of IP addresses, does not properly handle questions from clients that are denied recursion, which could cause a \"blank out\" of answers to those clients that are allowed to use recursion."
    },
    {
      "lang": "es",
      "value": "PowerDNS anterior a la 2.9.18, cuando permite recursi\u00f3n en un rango restringido de direcciones IP, no maneja adecuadamente peticiones de clientes a los que se les deniega la recursi\u00f3n. Esto podr\u00eda causar un \"bank out\" de respuestas a aquellos clientes que s\u00ed les es permitido usar recursi\u00f3n."
    }
  ],
  "id": "CVE-2005-2302",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 2.1,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2005-07-19T04:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://doc.powerdns.com/changelog.html#CHANGELOG-2-9-18"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://marc.info/?l=bugtraq\u0026m=112155941310297\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securitytracker.com/id?1014504"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.novell.com/linux/security/advisories/2005_19_sr.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://doc.powerdns.com/changelog.html#CHANGELOG-2-9-18"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=bugtraq\u0026m=112155941310297\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1014504"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.novell.com/linux/security/advisories/2005_19_sr.html"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2006-04-27 13:34
Modified
2025-04-03 01:03
Severity ?
Summary
The recursor in PowerDNS before 3.0.1 allows remote attackers to cause a denial of service (application crash) via malformed EDNS0 packets.
Impacted products
Vendor Product Version
powerdns powerdns 3.0



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:powerdns:powerdns:3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "42F3A03F-FB24-445D-A477-9109D0110BF8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The recursor in PowerDNS before 3.0.1 allows remote attackers to cause a denial of service (application crash) via malformed EDNS0 packets."
    }
  ],
  "id": "CVE-2006-2069",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2006-04-27T13:34:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://doc.powerdns.com/changelog.html#CHANGELOG-RECURSOR-3-0-1"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.suse.com/archive/suse-security-announce/2006-May/0004.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/19831"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/20117"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/17711"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2006/1527"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26100"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://doc.powerdns.com/changelog.html#CHANGELOG-RECURSOR-3-0-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.suse.com/archive/suse-security-announce/2006-May/0004.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/19831"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/20117"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/17711"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2006/1527"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26100"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-399"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2005-12-31 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
The DNS implementation of PowerDNS 2.9.16 and earlier allows remote attackers to cause a denial of service via a compressed DNS packet with a label length byte with an incorrect offset, which could trigger an infinite loop.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:powerdns:powerdns:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "33D4F84E-71E7-4D95-B0FF-D7254322F3A3",
              "versionEndIncluding": "2.9.16",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:powerdns:powerdns:2.0_rc1:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D8A0122-81ED-4951-BE34-9E8240FD297C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:powerdns:powerdns:2.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "2AC7BEE9-06FF-487D-B77D-5F05AA5C6324",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:powerdns:powerdns:2.9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C1E89A2-4993-4208-B67F-52B08A6F1BDF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:powerdns:powerdns:2.9.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B340CA64-2358-46E6-8F65-725B6ACE77D3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:powerdns:powerdns:2.9.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "8ADBB8B1-C732-49BA-9270-F5551A9E2D0D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:powerdns:powerdns:2.9.3a:*:*:*:*:*:*:*",
              "matchCriteriaId": "80C62126-2E61-4532-BFA2-D66FCCC8C9E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:powerdns:powerdns:2.9.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "4472A3D7-8E17-4D80-AA2D-724C74EEF9E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:powerdns:powerdns:2.9.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "07CDE603-2A52-4C6F-B6A3-563D516BB4C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:powerdns:powerdns:2.9.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC3E5668-9B66-4C80-8C38-6FF01C342182",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:powerdns:powerdns:2.9.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB793844-A30A-4F97-954B-690083E77430",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:powerdns:powerdns:2.9.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "B636157B-E627-4EF1-B6C2-640648C001D2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:powerdns:powerdns:2.9.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "34EEA40F-CD68-4AE9-A305-402BFBEEA23B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:powerdns:powerdns:2.9.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "40FFBCCC-3595-4148-A3CD-28FD390FB786",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:powerdns:powerdns:2.9.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B7722F1-D913-42A0-93EA-48140F47F221",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:powerdns:powerdns:2.9.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "16E26E04-71AA-4A00-B0EE-9A04A63ADBBE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:powerdns:powerdns:2.9.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A413F4D-123A-4AA6-A097-9900F9B39817",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:powerdns:powerdns:2.9.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F03070D-C76A-4A31-AA0C-E32442EBE83B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The DNS implementation of PowerDNS 2.9.16 and earlier allows remote attackers to cause a denial of service via a compressed DNS packet with a label length byte with an incorrect offset, which could trigger an infinite loop."
    }
  ],
  "id": "CVE-2005-0038",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2005-12-31T05:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://www.niscc.gov.uk/niscc/docs/al-20050524-00433.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.niscc.gov.uk/niscc/docs/re-20050524-00432.pdf?lang=en"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.osvdb.org/25291"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/13729"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.niscc.gov.uk/niscc/docs/al-20050524-00433.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.niscc.gov.uk/niscc/docs/re-20050524-00432.pdf?lang=en"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osvdb.org/25291"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/13729"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2008-08-08 19:41
Modified
2025-04-09 00:30
Severity ?
Summary
PowerDNS Authoritative Server before 2.9.21.1 drops malformed queries, which might make it easier for remote attackers to poison DNS caches of other products running on other servers, a different issue than CVE-2008-1447 and CVE-2008-3217.
References
cve@mitre.orghttp://doc.powerdns.com/changelog.html
cve@mitre.orghttp://doc.powerdns.com/powerdns-advisory-2008-02.html
cve@mitre.orghttp://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html
cve@mitre.orghttp://mailman.powerdns.com/pipermail/pdns-users/2008-August/005646.htmlPatch
cve@mitre.orghttp://secunia.com/advisories/31401
cve@mitre.orghttp://secunia.com/advisories/31407Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/31448
cve@mitre.orghttp://secunia.com/advisories/31687
cve@mitre.orghttp://secunia.com/advisories/33264
cve@mitre.orghttp://security.gentoo.org/glsa/glsa-200812-19.xml
cve@mitre.orghttp://www.securityfocus.com/bid/30587
cve@mitre.orghttp://www.vupen.com/english/advisories/2008/2320
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/44253
cve@mitre.orghttps://www.debian.org/security/2008/dsa-1628
cve@mitre.orghttps://www.redhat.com/archives/fedora-package-announce/2008-August/msg00109.html
cve@mitre.orghttps://www.redhat.com/archives/fedora-package-announce/2008-August/msg00140.html
af854a3a-2127-422b-91ae-364da2661108http://doc.powerdns.com/changelog.html
af854a3a-2127-422b-91ae-364da2661108http://doc.powerdns.com/powerdns-advisory-2008-02.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html
af854a3a-2127-422b-91ae-364da2661108http://mailman.powerdns.com/pipermail/pdns-users/2008-August/005646.htmlPatch
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/31401
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/31407Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/31448
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/31687
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/33264
af854a3a-2127-422b-91ae-364da2661108http://security.gentoo.org/glsa/glsa-200812-19.xml
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/30587
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2008/2320
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/44253
af854a3a-2127-422b-91ae-364da2661108https://www.debian.org/security/2008/dsa-1628
af854a3a-2127-422b-91ae-364da2661108https://www.redhat.com/archives/fedora-package-announce/2008-August/msg00109.html
af854a3a-2127-422b-91ae-364da2661108https://www.redhat.com/archives/fedora-package-announce/2008-August/msg00140.html
Impacted products
Vendor Product Version
powerdns authoritative_server *
powerdns powerdns *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:powerdns:authoritative_server:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "25F615C5-BE99-4CAF-AE71-30A9B4CE747F",
              "versionEndIncluding": "2.9.21",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:powerdns:powerdns:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDF235AA-7A2C-4223-AB14-A30058546EF1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "PowerDNS Authoritative Server before 2.9.21.1 drops malformed queries, which might make it easier for remote attackers to poison DNS caches of other products running on other servers, a different issue than CVE-2008-1447 and CVE-2008-3217."
    },
    {
      "lang": "es",
      "value": "PowerDNS Authoritative Server versiones anteriores a 2.9.21.1 descarga peticiones malformadas, lo cual puede hacer m\u00e1s f\u00e1cil a atacantes remotos envenenar cach\u00e9s DNS de otros productos ejecut\u00e1ndose en otros servidores, una cuesti\u00f3n diferente a  CVE-2008-1447 y CVE-2008-3217."
    }
  ],
  "id": "CVE-2008-3337",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.4,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 4.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2008-08-08T19:41:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://doc.powerdns.com/changelog.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://doc.powerdns.com/powerdns-advisory-2008-02.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://mailman.powerdns.com/pipermail/pdns-users/2008-August/005646.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/31401"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/31407"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/31448"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/31687"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/33264"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://security.gentoo.org/glsa/glsa-200812-19.xml"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/30587"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2008/2320"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44253"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.debian.org/security/2008/dsa-1628"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2008-August/msg00109.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2008-August/msg00140.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://doc.powerdns.com/changelog.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://doc.powerdns.com/powerdns-advisory-2008-02.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://mailman.powerdns.com/pipermail/pdns-users/2008-August/005646.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/31401"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/31407"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/31448"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/31687"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/33264"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://security.gentoo.org/glsa/glsa-200812-19.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/30587"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2008/2320"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44253"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.debian.org/security/2008/dsa-1628"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2008-August/msg00109.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2008-August/msg00140.html"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2005-05-02 04:00
Modified
2025-04-03 01:03
Severity ?
Summary
The DNSPacket::expand method in dnspacket.cc in PowerDNS before 2.9.17 allows remote attackers to cause a denial of service by sending a random stream of bytes.
Impacted products
Vendor Product Version
powerdns powerdns 2.0_rc1
powerdns powerdns 2.8
powerdns powerdns 2.9.15



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:powerdns:powerdns:2.0_rc1:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D8A0122-81ED-4951-BE34-9E8240FD297C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:powerdns:powerdns:2.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "2AC7BEE9-06FF-487D-B77D-5F05AA5C6324",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:powerdns:powerdns:2.9.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F03070D-C76A-4A31-AA0C-E32442EBE83B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The DNSPacket::expand method in dnspacket.cc in PowerDNS before 2.9.17 allows remote attackers to cause a denial of service by sending a random stream of bytes."
    },
    {
      "lang": "es",
      "value": "El m\u00e9todo DNSPacket::expand en dnspacket.cc de PowerDNS anterior a la 2.9.17 permite a atacantes remotos causar la Denegaci\u00f3n de Servicios (DoS) mediante el env\u00edo de un flujo aleatorio de bytes."
    }
  ],
  "id": "CVE-2005-0428",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2005-05-02T04:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://doc.powerdns.com/changelog.html#CHANGELOG-2-9-17"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://ds9a.nl/cgi-bin/cvstrac/pdns/tktview?tn=21"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.gentoo.org/security/en/glsa/glsa-200502-15.xml"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.securityfocus.com/bid/12446"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19221"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://doc.powerdns.com/changelog.html#CHANGELOG-2-9-17"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://ds9a.nl/cgi-bin/cvstrac/pdns/tktview?tn=21"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.gentoo.org/security/en/glsa/glsa-200502-15.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.securityfocus.com/bid/12446"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19221"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2008-12-09 00:30
Modified
2025-04-09 00:30
Severity ?
Summary
PowerDNS before 2.9.21.2 allows remote attackers to cause a denial of service (daemon crash) via a CH HINFO query.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:powerdns:powerdns:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "BAD2312B-4B45-4615-A04B-371E899E7687",
              "versionEndIncluding": "2.9.21.1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:powerdns:powerdns:1.99.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F9593BDE-0312-4974-9BB0-9F36A2E322CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:powerdns:powerdns:1.99.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC86997B-563C-45A1-A00E-4BA528399045",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:powerdns:powerdns:1.99.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "302D8930-8978-4F96-8567-FFE729DE090B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:powerdns:powerdns:1.99.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "7220C466-C380-44D1-9F34-14CE6F6C74B6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:powerdns:powerdns:1.99.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "A3B6317C-4432-4B00-A9A4-2E4E3616CD46",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:powerdns:powerdns:1.99.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA1E7C15-C860-45EB-9765-1A0314B00E12",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:powerdns:powerdns:1.99.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "A24A144D-DD9C-41AA-8813-520BD32BE11D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:powerdns:powerdns:1.99.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E8F9E1D-324A-4AF1-A4CC-BB1878AC651D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:powerdns:powerdns:1.99.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "A076AC5F-2F6C-41B1-9ACB-EF449AE889D5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:powerdns:powerdns:1.99.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D72865C-E4EE-414E-B503-6613AE806E2E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:powerdns:powerdns:1.99.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "165B5D82-A9B1-4FD0-9D2E-936E9F17AB9B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:powerdns:powerdns:1.99.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "22CC81DB-C4D8-41E8-913D-A7AE7E944295",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:powerdns:powerdns:2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "04B35FA9-6D67-4A72-AD4D-7DB55ABB316A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:powerdns:powerdns:2.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "53BFFA37-2992-4E2B-84C5-074AC5884B4D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:powerdns:powerdns:2.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "57A9CD23-6152-4C37-968B-3026E08075A4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:powerdns:powerdns:2.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F54E488-7932-427D-A22A-BA49615CF49A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:powerdns:powerdns:2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "0AE78107-A82E-442F-B6B6-0EBE631C7536",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:powerdns:powerdns:2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "FDD20EBB-7FF5-4355-ADF8-0967BFE20BD1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:powerdns:powerdns:2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC92BD1B-DCB7-4DB1-9B1B-6E71E04B5FEB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:powerdns:powerdns:2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "3855CD77-D3BB-4A0A-B442-EFDEB0990AF2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:powerdns:powerdns:2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "0983B0D7-07B0-4090-BCFF-244E023B38D0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:powerdns:powerdns:2.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "058AF85E-5FF5-4FBD-8BEF-F7B227CE6BD1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:powerdns:powerdns:2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "D141A8D1-C9A0-450A-827A-A956B8D20A99",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:powerdns:powerdns:2.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "2AC7BEE9-06FF-487D-B77D-5F05AA5C6324",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:powerdns:powerdns:2.9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C1E89A2-4993-4208-B67F-52B08A6F1BDF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:powerdns:powerdns:2.9.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B340CA64-2358-46E6-8F65-725B6ACE77D3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:powerdns:powerdns:2.9.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "8ADBB8B1-C732-49BA-9270-F5551A9E2D0D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:powerdns:powerdns:2.9.3a:*:*:*:*:*:*:*",
              "matchCriteriaId": "80C62126-2E61-4532-BFA2-D66FCCC8C9E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:powerdns:powerdns:2.9.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "4472A3D7-8E17-4D80-AA2D-724C74EEF9E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:powerdns:powerdns:2.9.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "07CDE603-2A52-4C6F-B6A3-563D516BB4C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:powerdns:powerdns:2.9.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC3E5668-9B66-4C80-8C38-6FF01C342182",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:powerdns:powerdns:2.9.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB793844-A30A-4F97-954B-690083E77430",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:powerdns:powerdns:2.9.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "B636157B-E627-4EF1-B6C2-640648C001D2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:powerdns:powerdns:2.9.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "34EEA40F-CD68-4AE9-A305-402BFBEEA23B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:powerdns:powerdns:2.9.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "40FFBCCC-3595-4148-A3CD-28FD390FB786",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:powerdns:powerdns:2.9.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B7722F1-D913-42A0-93EA-48140F47F221",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:powerdns:powerdns:2.9.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "16E26E04-71AA-4A00-B0EE-9A04A63ADBBE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:powerdns:powerdns:2.9.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A413F4D-123A-4AA6-A097-9900F9B39817",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:powerdns:powerdns:2.9.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F03070D-C76A-4A31-AA0C-E32442EBE83B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:powerdns:powerdns:2.9.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2BE9083-C8DA-4CCB-AAA0-8E31A1C566D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:powerdns:powerdns:2.9.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "11FC77A2-E464-4832-ADCD-68D66E7CB29E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "PowerDNS before 2.9.21.2 allows remote attackers to cause a denial of service (daemon crash) via a CH HINFO query."
    },
    {
      "lang": "es",
      "value": "PowerDNS y versiones anteriores a 2.9.21.2 permite a los atacantes remotos causar una denegaci\u00f3n de servicios (ca\u00edda del daemon) a trav\u00e9s de una petici\u00f3n CH HINFO."
    }
  ],
  "id": "CVE-2008-5277",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2008-12-09T00:30:00.317",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://doc.powerdns.com/powerdns-advisory-2008-03.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2008-12/msg00002.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/32979"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/33264"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://security.gentoo.org/glsa/glsa-200812-19.xml"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securitytracker.com/id?1021304"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/32627"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47076"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://doc.powerdns.com/powerdns-advisory-2008-03.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2008-12/msg00002.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/32979"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/33264"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://security.gentoo.org/glsa/glsa-200812-19.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1021304"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/32627"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47076"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-16"
        },
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}