Unrated severityNVD Advisory· Published Jul 27, 2021· Updated Aug 4, 2024
CVE-2021-36754
CVE-2021-36754
Description
PowerDNS Authoritative Server 4.5.0 before 4.5.1 allows anybody to crash the process by sending a specific query (QTYPE 65535) that causes an out-of-bounds exception.
Affected products
8- PowerDNS/Authoritative Serverdescription
- osv-coords7 versionspkg:deb/ubuntu/pdns?arch=src?distro=esm-apps/bionicpkg:deb/ubuntu/pdns?arch=src?distro=esm-apps/xenialpkg:deb/ubuntu/pdns?arch=src?distro=focalpkg:deb/ubuntu/pdns?arch=src?distro=jammypkg:deb/ubuntu/pdns?arch=src?distro=noblepkg:deb/ubuntu/pdns?arch=src?distro=oracularpkg:rpm/opensuse/pdns&distro=openSUSE%20Tumbleweed
>= 0+ 6 more
- (no CPE)range: >= 0
- (no CPE)range: >= 0
- (no CPE)range: >= 0
- (no CPE)range: >= 0
- (no CPE)range: >= 0
- (no CPE)range: >= 0
- (no CPE)range: < 4.5.1-1.5
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- www.openwall.com/lists/oss-security/2021/07/26/2mitremailing-listx_refsource_MLIST
- doc.powerdns.com/authoritative/security-advisories/index.htmlmitrex_refsource_MISC
- doc.powerdns.com/authoritative/security-advisories/powerdns-advisory-2021-01.htmlmitrex_refsource_CONFIRM
News mentions
0No linked articles in our index yet.