Unrated severityNVD Advisory· Published Dec 3, 2018· Updated Aug 5, 2024
CVE-2018-16855
CVE-2018-16855
Description
An issue has been found in PowerDNS Recursor before version 4.1.8 where a remote attacker sending a DNS query can trigger an out-of-bounds memory read while computing the hash of the query for a packet cache lookup, possibly leading to a crash.
Affected products
4- osv-coords3 versionspkg:rpm/opensuse/pdns-recursor&distro=openSUSE%20Tumbleweedpkg:rpm/suse/pdns-recursor&distro=SUSE%20Package%20Hub%2012%20SP1pkg:rpm/suse/pdns-recursor&distro=SUSE%20Package%20Hub%2015
< 4.5.5-1.3+ 2 more
- (no CPE)range: < 4.5.5-1.3
- (no CPE)range: < 4.1.8-13.1
- (no CPE)range: < 4.1.2-bp150.2.3.1
- Range: 4.1.8
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2- bugzilla.redhat.com/show_bug.cgimitrex_refsource_CONFIRM
- docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2018-09.htmlmitrex_refsource_MISC
News mentions
0No linked articles in our index yet.