ID CVE-2017-15120
Summary An issue has been found in the parsing of authoritative answers in PowerDNS Recursor before 4.0.8, leading to a NULL pointer dereference when parsing a specially crafted answer containing a CNAME of a different class than IN. An unauthenticated remote attacker could cause a denial of service.
References
Vulnerable Configurations
  • cpe:2.3:a:powerdns:recursor:3.0:*:*:*:*:*:*:*
    cpe:2.3:a:powerdns:recursor:3.0:*:*:*:*:*:*:*
  • cpe:2.3:a:powerdns:recursor:3.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:powerdns:recursor:3.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:powerdns:recursor:3.1.1:*:*:*:*:*:*:*
    cpe:2.3:a:powerdns:recursor:3.1.1:*:*:*:*:*:*:*
  • cpe:2.3:a:powerdns:recursor:3.1.2:*:*:*:*:*:*:*
    cpe:2.3:a:powerdns:recursor:3.1.2:*:*:*:*:*:*:*
  • cpe:2.3:a:powerdns:recursor:3.1.3:*:*:*:*:*:*:*
    cpe:2.3:a:powerdns:recursor:3.1.3:*:*:*:*:*:*:*
  • cpe:2.3:a:powerdns:recursor:3.1.4:*:*:*:*:*:*:*
    cpe:2.3:a:powerdns:recursor:3.1.4:*:*:*:*:*:*:*
  • cpe:2.3:a:powerdns:recursor:3.1.5:*:*:*:*:*:*:*
    cpe:2.3:a:powerdns:recursor:3.1.5:*:*:*:*:*:*:*
  • cpe:2.3:a:powerdns:recursor:3.1.6:*:*:*:*:*:*:*
    cpe:2.3:a:powerdns:recursor:3.1.6:*:*:*:*:*:*:*
  • cpe:2.3:a:powerdns:recursor:3.1.7:*:*:*:*:*:*:*
    cpe:2.3:a:powerdns:recursor:3.1.7:*:*:*:*:*:*:*
  • cpe:2.3:a:powerdns:recursor:3.1.7.1:*:*:*:*:*:*:*
    cpe:2.3:a:powerdns:recursor:3.1.7.1:*:*:*:*:*:*:*
  • cpe:2.3:a:powerdns:recursor:3.1.7.2:*:*:*:*:*:*:*
    cpe:2.3:a:powerdns:recursor:3.1.7.2:*:*:*:*:*:*:*
  • cpe:2.3:a:powerdns:recursor:3.2:*:*:*:*:*:*:*
    cpe:2.3:a:powerdns:recursor:3.2:*:*:*:*:*:*:*
  • cpe:2.3:a:powerdns:recursor:3.3:*:*:*:*:*:*:*
    cpe:2.3:a:powerdns:recursor:3.3:*:*:*:*:*:*:*
  • cpe:2.3:a:powerdns:recursor:3.3.1:*:*:*:*:*:*:*
    cpe:2.3:a:powerdns:recursor:3.3.1:*:*:*:*:*:*:*
  • cpe:2.3:a:powerdns:recursor:3.5:*:*:*:*:*:*:*
    cpe:2.3:a:powerdns:recursor:3.5:*:*:*:*:*:*:*
  • cpe:2.3:a:powerdns:recursor:3.5.1:*:*:*:*:*:*:*
    cpe:2.3:a:powerdns:recursor:3.5.1:*:*:*:*:*:*:*
  • cpe:2.3:a:powerdns:recursor:3.5.2:*:*:*:*:*:*:*
    cpe:2.3:a:powerdns:recursor:3.5.2:*:*:*:*:*:*:*
  • cpe:2.3:a:powerdns:recursor:3.5.3:*:*:*:*:*:*:*
    cpe:2.3:a:powerdns:recursor:3.5.3:*:*:*:*:*:*:*
  • cpe:2.3:a:powerdns:recursor:3.6.0:*:*:*:*:*:*:*
    cpe:2.3:a:powerdns:recursor:3.6.0:*:*:*:*:*:*:*
  • cpe:2.3:a:powerdns:recursor:3.6.1:*:*:*:*:*:*:*
    cpe:2.3:a:powerdns:recursor:3.6.1:*:*:*:*:*:*:*
  • cpe:2.3:a:powerdns:recursor:3.6.2:*:*:*:*:*:*:*
    cpe:2.3:a:powerdns:recursor:3.6.2:*:*:*:*:*:*:*
  • cpe:2.3:a:powerdns:recursor:3.6.3:*:*:*:*:*:*:*
    cpe:2.3:a:powerdns:recursor:3.6.3:*:*:*:*:*:*:*
  • cpe:2.3:a:powerdns:recursor:3.6.4:*:*:*:*:*:*:*
    cpe:2.3:a:powerdns:recursor:3.6.4:*:*:*:*:*:*:*
  • cpe:2.3:a:powerdns:recursor:3.7.0:*:*:*:*:*:*:*
    cpe:2.3:a:powerdns:recursor:3.7.0:*:*:*:*:*:*:*
  • cpe:2.3:a:powerdns:recursor:3.7.1:*:*:*:*:*:*:*
    cpe:2.3:a:powerdns:recursor:3.7.1:*:*:*:*:*:*:*
  • cpe:2.3:a:powerdns:recursor:3.7.2:*:*:*:*:*:*:*
    cpe:2.3:a:powerdns:recursor:3.7.2:*:*:*:*:*:*:*
  • cpe:2.3:a:powerdns:recursor:3.7.3:*:*:*:*:*:*:*
    cpe:2.3:a:powerdns:recursor:3.7.3:*:*:*:*:*:*:*
  • cpe:2.3:a:powerdns:recursor:3.7.4:*:*:*:*:*:*:*
    cpe:2.3:a:powerdns:recursor:3.7.4:*:*:*:*:*:*:*
  • cpe:2.3:a:powerdns:recursor:4.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:powerdns:recursor:4.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:powerdns:recursor:4.0.0:-:*:*:*:*:*:*
    cpe:2.3:a:powerdns:recursor:4.0.0:-:*:*:*:*:*:*
  • cpe:2.3:a:powerdns:recursor:4.0.0:alpha1:*:*:*:*:*:*
    cpe:2.3:a:powerdns:recursor:4.0.0:alpha1:*:*:*:*:*:*
  • cpe:2.3:a:powerdns:recursor:4.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:powerdns:recursor:4.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:powerdns:recursor:4.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:powerdns:recursor:4.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:powerdns:recursor:4.0.3:*:*:*:*:*:*:*
    cpe:2.3:a:powerdns:recursor:4.0.3:*:*:*:*:*:*:*
  • cpe:2.3:a:powerdns:recursor:4.0.4:*:*:*:*:*:*:*
    cpe:2.3:a:powerdns:recursor:4.0.4:*:*:*:*:*:*:*
  • cpe:2.3:a:powerdns:recursor:4.0.5:*:*:*:*:*:*:*
    cpe:2.3:a:powerdns:recursor:4.0.5:*:*:*:*:*:*:*
  • cpe:2.3:a:powerdns:recursor:4.0.6:*:*:*:*:*:*:*
    cpe:2.3:a:powerdns:recursor:4.0.6:*:*:*:*:*:*:*
  • cpe:2.3:a:powerdns:recursor:4.0.7:*:*:*:*:*:*:*
    cpe:2.3:a:powerdns:recursor:4.0.7:*:*:*:*:*:*:*
  • cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
    cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
  • cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
    cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
CVSS
Base: 5.0 (as of 09-10-2019 - 23:24)
Impact:
Exploitability:
CWE CWE-476
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
NONE NONE PARTIAL
cvss-vector via4 AV:N/AC:L/Au:N/C:N/I:N/A:P
refmap via4
bid 106335
confirm
debian DSA-4063
mlist [oss-security] 20171211 PowerDNS Security Advisory 2017-08
Last major update 09-10-2019 - 23:24
Published 27-07-2018 - 15:29
Last modified 09-10-2019 - 23:24
Back to Top