{"vulnerability": "CVE-2016-2120", "sightings": [{"uuid": "47d92f01-72d0-4aba-b9f3-b0394a4fdb75", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2016-2120", "type": "seen", "source": "https://t.me/cibsecurity/987", "content": "ATENTION\u203c New - CVE-2016-2120\n\nAn issue has been found in PowerDNS Authoritative Server versions up to and including 3.4.10, 4.0.1 allowing an authorized user to crash the server by inserting a specially crafted record in a zone under their control then sending a DNS query for that record. The issue is due to an integer overflow when checking if the content of the record matches the expected size, allowing an attacker to cause a read past the buffer boundary.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2018-11-01T15:20:37.000000Z"}]}