Unrated severityNVD Advisory· Published Sep 11, 2018· Updated Aug 6, 2024
CVE-2016-7068
CVE-2016-7068
Description
An issue has been found in PowerDNS before 3.4.11 and 4.0.2, and PowerDNS recursor before 3.7.4 and 4.0.4, allowing a remote, unauthenticated attacker to cause an abnormal CPU usage load on the PowerDNS server by sending crafted DNS queries, which might result in a partial denial of service if the system becomes overloaded. This issue is based on the fact that the PowerDNS server parses all records present in a query regardless of whether they are needed or even legitimate. A specially crafted query containing a large number of records can be used to take advantage of that behaviour.
Affected products
3- osv-coords2 versionspkg:rpm/opensuse/pdns&distro=openSUSE%20Tumbleweedpkg:rpm/opensuse/pdns-recursor&distro=openSUSE%20Tumbleweed
< 4.5.1-1.5+ 1 more
- (no CPE)range: < 4.5.1-1.5
- (no CPE)range: < 4.5.5-1.3
- Open-Xchange/pdnsv5Range: 3.4.11
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- www.debian.org/security/2017/dsa-3763mitrevendor-advisoryx_refsource_DEBIAN
- www.debian.org/security/2017/dsa-3764mitrevendor-advisoryx_refsource_DEBIAN
- bugzilla.redhat.com/show_bug.cgimitrex_refsource_CONFIRM
- doc.powerdns.com/md/security/powerdns-advisory-2016-02/mitrex_refsource_CONFIRM
News mentions
0No linked articles in our index yet.