CERTA-2012-AVI-016
Vulnerability from certfr_avis

Un attaquant peut réaliser un déni de service à distance à l'aide de paquets UDP spécialement conçus.

Description

Une erreur dans le traitement des paquets « réponse DNS » par PowerDNS permet à un attaquant, au moyen de paquets UDP spécialement conçus, d'épuiser les ressources systèmes en forçant le serveur à répondre en boucle à ses propres réponses.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
N/A N/A PowerDNS Authoritative Server versions 3.x inférieures à la 3.0.1.
N/A N/A PowerDNS Authoritative Server versions 2.x inférieures à la 2.9.22.5 ;

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "PowerDNS Authoritative Server versions 3.x inf\u00e9rieures \u00e0 la 3.0.1.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "N/A",
          "scada": false
        }
      }
    },
    {
      "description": "PowerDNS Authoritative Server versions 2.x inf\u00e9rieures \u00e0 la 2.9.22.5 ;",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "N/A",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Description\n\nUne erreur dans le traitement des paquets \u00ab r\u00e9ponse DNS \u00bb par PowerDNS\npermet \u00e0 un attaquant, au moyen de paquets UDP sp\u00e9cialement con\u00e7us,\nd\u0027\u00e9puiser les ressources syst\u00e8mes en for\u00e7ant le serveur \u00e0 r\u00e9pondre en\nboucle \u00e0 ses propres r\u00e9ponses.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2012-0206",
      "url": "https://www.cve.org/CVERecord?id=CVE-2012-0206"
    }
  ],
  "initial_release_date": "2012-01-13T00:00:00",
  "last_revision_date": "2012-01-13T00:00:00",
  "links": [
    {
      "title": "Bulletin de s\u00e9curit\u00e9 PowerDNS Authoritative Server du 10    janvier 2012 :",
      "url": "http://www.powerdns.com/news/powerdns-security-advisory-2012-01.html"
    }
  ],
  "reference": "CERTA-2012-AVI-016",
  "revisions": [
    {
      "description": "version initiale.",
      "revision_date": "2012-01-13T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    }
  ],
  "summary": "Un attaquant peut r\u00e9aliser un d\u00e9ni de service \u00e0 distance \u00e0 l\u0027aide de\npaquets UDP sp\u00e9cialement con\u00e7us.\n",
  "title": "Vuln\u00e9rabilit\u00e9 dans PowerDNS",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 PowerDNS Authoritative Server du 10 janvier 2012",
      "url": null
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…