Unrated severityNVD Advisory· Published Nov 22, 2019· Updated Aug 4, 2024
CVE-2019-10203
CVE-2019-10203
Description
PowerDNS Authoritative daemon , pdns versions 4.0.x before 4.0.9, 4.1.x before 4.1.11, exiting when encountering a serial between 2^31 and 2^32-1 while trying to notify a slave leads to DoS.
Affected products
7- osv-coords6 versionspkg:rpm/opensuse/pdns&distro=openSUSE%20Leap%2015.0pkg:rpm/opensuse/pdns&distro=openSUSE%20Leap%2015.1pkg:rpm/opensuse/pdns&distro=openSUSE%20Tumbleweedpkg:rpm/suse/pdns&distro=SUSE%20Package%20Hub%2012%20SP1pkg:rpm/suse/pdns&distro=SUSE%20Package%20Hub%2015pkg:rpm/suse/pdns&distro=SUSE%20Package%20Hub%2015%20SP1
< 4.1.2-bp150.2.9.1+ 5 more
- (no CPE)range: < 4.1.2-bp150.2.9.1
- (no CPE)range: < 4.1.2-bp150.2.9.1
- (no CPE)range: < 4.5.1-1.5
- (no CPE)range: < 4.1.2-bp150.2.9.1
- (no CPE)range: < 4.1.2-bp150.2.9.1
- (no CPE)range: < 4.1.8-bp151.3.3.1
- Red Hat/pdnsv5Range: pdns versions 4.0.x before 4.0.9, 4.1.x before 4.1.11
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2- bugzilla.redhat.com/show_bug.cgimitrex_refsource_CONFIRM
- doc.powerdns.com/authoritative/security-advisories/powerdns-advisory-2019-06.htmlmitrex_refsource_CONFIRM
News mentions
0No linked articles in our index yet.