suse-su-2023:2777-1
Vulnerability from csaf_suse
Published
2023-07-04 08:39
Modified
2023-07-04 08:39
Summary
Security update for dnsdist

Notes

Title of the patch
Security update for dnsdist
Description of the patch
This update for dnsdist fixes the following issues: - Implements package 'dnsdist' with version 1.8.0 in SLE15. (jsc#PED-3402) - Downstream DNS resolver configuration should be chosen by the admin - Security fix: fixes a possible record smugging with a crafted DNS query with trailing data (CVE-2018-14663, bsc#1114511) - Security fix: There is an issue that can lead to a denial of service on 32-bit if a backend sends crafted answers. (CVE-2016-7069, bsc#1054799) - Security fix: Alteration of dnsdist's ACL if the API is enabled, writable and an authenticated user is tricked into visiting a crafted website. (CVE-2017-7557, bsc#1054799) - SNMP support, exporting statistics and sending traps - Preventing the packet cache from ageing responses when deployed in - Various DNSCrypt-related fixes and improvements, including automatic key rotation
Patchnames
SUSE-2023-2777,SUSE-SLE-Product-SLES-15-SP1-LTSS-2023-2777,SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-2777,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-2777,SUSE-SLE-Product-SLES_SAP-15-SP1-2023-2777,SUSE-SLE-Product-SLES_SAP-15-SP2-2023-2777
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).



{
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "moderate"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Security update for dnsdist",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "This update for dnsdist fixes the following issues:\n\n- Implements package \u0027dnsdist\u0027 with version 1.8.0 in SLE15. (jsc#PED-3402)\n- Downstream DNS resolver configuration should be chosen by the admin\n- Security fix: fixes a possible record smugging with a crafted DNS query with trailing data (CVE-2018-14663, bsc#1114511)\n- Security fix: There is an issue that can lead to a denial of service on 32-bit if a backend sends crafted answers. (CVE-2016-7069, bsc#1054799)\n- Security fix: Alteration of dnsdist\u0027s ACL if the API is enabled, writable and an authenticated user is tricked into visiting a crafted website. (CVE-2017-7557, bsc#1054799)\n- SNMP support, exporting statistics and sending traps\n- Preventing the packet cache from ageing responses when deployed in\n- Various DNSCrypt-related fixes and improvements, including automatic key rotation\n  ",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "SUSE-2023-2777,SUSE-SLE-Product-SLES-15-SP1-LTSS-2023-2777,SUSE-SLE-Product-SLES-15-SP2-LTSS-2023-2777,SUSE-SLE-Product-SLES-15-SP3-LTSS-2023-2777,SUSE-SLE-Product-SLES_SAP-15-SP1-2023-2777,SUSE-SLE-Product-SLES_SAP-15-SP2-2023-2777",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2023_2777-1.json"
      },
      {
        "category": "self",
        "summary": "URL for SUSE-SU-2023:2777-1",
        "url": "https://www.suse.com/support/update/announcement/2023/suse-su-20232777-1/"
      },
      {
        "category": "self",
        "summary": "E-Mail link for SUSE-SU-2023:2777-1",
        "url": "https://lists.suse.com/pipermail/sle-updates/2023-July/030190.html"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1054799",
        "url": "https://bugzilla.suse.com/1054799"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1054802",
        "url": "https://bugzilla.suse.com/1054802"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1114511",
        "url": "https://bugzilla.suse.com/1114511"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2016-7069 page",
        "url": "https://www.suse.com/security/cve/CVE-2016-7069/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2017-7557 page",
        "url": "https://www.suse.com/security/cve/CVE-2017-7557/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2018-14663 page",
        "url": "https://www.suse.com/security/cve/CVE-2018-14663/"
      }
    ],
    "title": "Security update for dnsdist",
    "tracking": {
      "current_release_date": "2023-07-04T08:39:57Z",
      "generator": {
        "date": "2023-07-04T08:39:57Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "SUSE-SU-2023:2777-1",
      "initial_release_date": "2023-07-04T08:39:57Z",
      "revision_history": [
        {
          "date": "2023-07-04T08:39:57Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "dnsdist-1.8.0-150100.3.5.1.aarch64",
                "product": {
                  "name": "dnsdist-1.8.0-150100.3.5.1.aarch64",
                  "product_id": "dnsdist-1.8.0-150100.3.5.1.aarch64"
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "dnsdist-1.8.0-150100.3.5.1.i586",
                "product": {
                  "name": "dnsdist-1.8.0-150100.3.5.1.i586",
                  "product_id": "dnsdist-1.8.0-150100.3.5.1.i586"
                }
              }
            ],
            "category": "architecture",
            "name": "i586"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "dnsdist-1.8.0-150100.3.5.1.x86_64",
                "product": {
                  "name": "dnsdist-1.8.0-150100.3.5.1.x86_64",
                  "product_id": "dnsdist-1.8.0-150100.3.5.1.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server 15 SP1-LTSS",
                "product": {
                  "name": "SUSE Linux Enterprise Server 15 SP1-LTSS",
                  "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sles-ltss:15:sp1"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server 15 SP2-LTSS",
                "product": {
                  "name": "SUSE Linux Enterprise Server 15 SP2-LTSS",
                  "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sles-ltss:15:sp2"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server 15 SP3-LTSS",
                "product": {
                  "name": "SUSE Linux Enterprise Server 15 SP3-LTSS",
                  "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sles-ltss:15:sp3"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP1",
                "product": {
                  "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP1",
                  "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sles_sap:15:sp1"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP2",
                "product": {
                  "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP2",
                  "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sles_sap:15:sp2"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dnsdist-1.8.0-150100.3.5.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:dnsdist-1.8.0-150100.3.5.1.aarch64"
        },
        "product_reference": "dnsdist-1.8.0-150100.3.5.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dnsdist-1.8.0-150100.3.5.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:dnsdist-1.8.0-150100.3.5.1.x86_64"
        },
        "product_reference": "dnsdist-1.8.0-150100.3.5.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dnsdist-1.8.0-150100.3.5.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:dnsdist-1.8.0-150100.3.5.1.aarch64"
        },
        "product_reference": "dnsdist-1.8.0-150100.3.5.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dnsdist-1.8.0-150100.3.5.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:dnsdist-1.8.0-150100.3.5.1.x86_64"
        },
        "product_reference": "dnsdist-1.8.0-150100.3.5.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dnsdist-1.8.0-150100.3.5.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:dnsdist-1.8.0-150100.3.5.1.aarch64"
        },
        "product_reference": "dnsdist-1.8.0-150100.3.5.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dnsdist-1.8.0-150100.3.5.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:dnsdist-1.8.0-150100.3.5.1.x86_64"
        },
        "product_reference": "dnsdist-1.8.0-150100.3.5.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dnsdist-1.8.0-150100.3.5.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:dnsdist-1.8.0-150100.3.5.1.x86_64"
        },
        "product_reference": "dnsdist-1.8.0-150100.3.5.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dnsdist-1.8.0-150100.3.5.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:dnsdist-1.8.0-150100.3.5.1.x86_64"
        },
        "product_reference": "dnsdist-1.8.0-150100.3.5.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2016-7069",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2016-7069"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An issue has been found in dnsdist before 1.2.0 in the way EDNS0 OPT records are handled when parsing responses from a backend. When dnsdist is configured to add EDNS Client Subnet to a query, the response may contain an EDNS0 OPT record that has to be removed before forwarding the response to the initial client. On a 32-bit system, the pointer arithmetic used when parsing the received response to remove that record might trigger an undefined behavior leading to a crash.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 15 SP1-LTSS:dnsdist-1.8.0-150100.3.5.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:dnsdist-1.8.0-150100.3.5.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:dnsdist-1.8.0-150100.3.5.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:dnsdist-1.8.0-150100.3.5.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP3-LTSS:dnsdist-1.8.0-150100.3.5.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP3-LTSS:dnsdist-1.8.0-150100.3.5.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:dnsdist-1.8.0-150100.3.5.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:dnsdist-1.8.0-150100.3.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2016-7069",
          "url": "https://www.suse.com/security/cve/CVE-2016-7069"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1054799 for CVE-2016-7069",
          "url": "https://bugzilla.suse.com/1054799"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 15 SP1-LTSS:dnsdist-1.8.0-150100.3.5.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:dnsdist-1.8.0-150100.3.5.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:dnsdist-1.8.0-150100.3.5.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:dnsdist-1.8.0-150100.3.5.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:dnsdist-1.8.0-150100.3.5.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:dnsdist-1.8.0-150100.3.5.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:dnsdist-1.8.0-150100.3.5.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:dnsdist-1.8.0-150100.3.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.0"
          },
          "products": [
            "SUSE Linux Enterprise Server 15 SP1-LTSS:dnsdist-1.8.0-150100.3.5.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:dnsdist-1.8.0-150100.3.5.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:dnsdist-1.8.0-150100.3.5.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:dnsdist-1.8.0-150100.3.5.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:dnsdist-1.8.0-150100.3.5.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:dnsdist-1.8.0-150100.3.5.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:dnsdist-1.8.0-150100.3.5.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:dnsdist-1.8.0-150100.3.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2023-07-04T08:39:57Z",
          "details": "important"
        }
      ],
      "title": "CVE-2016-7069"
    },
    {
      "cve": "CVE-2017-7557",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2017-7557"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "dnsdist version 1.1.0 is vulnerable to a flaw in authentication mechanism for REST API potentially allowing CSRF attack.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 15 SP1-LTSS:dnsdist-1.8.0-150100.3.5.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:dnsdist-1.8.0-150100.3.5.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:dnsdist-1.8.0-150100.3.5.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:dnsdist-1.8.0-150100.3.5.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP3-LTSS:dnsdist-1.8.0-150100.3.5.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP3-LTSS:dnsdist-1.8.0-150100.3.5.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:dnsdist-1.8.0-150100.3.5.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:dnsdist-1.8.0-150100.3.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2017-7557",
          "url": "https://www.suse.com/security/cve/CVE-2017-7557"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1054802 for CVE-2017-7557",
          "url": "https://bugzilla.suse.com/1054802"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 15 SP1-LTSS:dnsdist-1.8.0-150100.3.5.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:dnsdist-1.8.0-150100.3.5.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:dnsdist-1.8.0-150100.3.5.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:dnsdist-1.8.0-150100.3.5.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:dnsdist-1.8.0-150100.3.5.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:dnsdist-1.8.0-150100.3.5.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:dnsdist-1.8.0-150100.3.5.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:dnsdist-1.8.0-150100.3.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          "products": [
            "SUSE Linux Enterprise Server 15 SP1-LTSS:dnsdist-1.8.0-150100.3.5.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:dnsdist-1.8.0-150100.3.5.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:dnsdist-1.8.0-150100.3.5.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:dnsdist-1.8.0-150100.3.5.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:dnsdist-1.8.0-150100.3.5.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:dnsdist-1.8.0-150100.3.5.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:dnsdist-1.8.0-150100.3.5.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:dnsdist-1.8.0-150100.3.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2023-07-04T08:39:57Z",
          "details": "important"
        }
      ],
      "title": "CVE-2017-7557"
    },
    {
      "cve": "CVE-2018-14663",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2018-14663"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An issue has been found in PowerDNS DNSDist before 1.3.3 allowing a remote attacker to craft a DNS query with trailing data such that the addition of a record by dnsdist, for example an OPT record when adding EDNS Client Subnet, might result in the trailing data being smuggled to the backend as a valid record while not seen by dnsdist. This is an issue when dnsdist is deployed as a DNS Firewall and used to filter some records that should not be received by the backend. This issue occurs only when either the \u0027useClientSubnet\u0027 or the experimental \u0027addXPF\u0027 parameters are used when declaring a new backend.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 15 SP1-LTSS:dnsdist-1.8.0-150100.3.5.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP1-LTSS:dnsdist-1.8.0-150100.3.5.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:dnsdist-1.8.0-150100.3.5.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:dnsdist-1.8.0-150100.3.5.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP3-LTSS:dnsdist-1.8.0-150100.3.5.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP3-LTSS:dnsdist-1.8.0-150100.3.5.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP1:dnsdist-1.8.0-150100.3.5.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:dnsdist-1.8.0-150100.3.5.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2018-14663",
          "url": "https://www.suse.com/security/cve/CVE-2018-14663"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1114511 for CVE-2018-14663",
          "url": "https://bugzilla.suse.com/1114511"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 15 SP1-LTSS:dnsdist-1.8.0-150100.3.5.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:dnsdist-1.8.0-150100.3.5.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:dnsdist-1.8.0-150100.3.5.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:dnsdist-1.8.0-150100.3.5.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:dnsdist-1.8.0-150100.3.5.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:dnsdist-1.8.0-150100.3.5.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:dnsdist-1.8.0-150100.3.5.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:dnsdist-1.8.0-150100.3.5.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
            "version": "3.0"
          },
          "products": [
            "SUSE Linux Enterprise Server 15 SP1-LTSS:dnsdist-1.8.0-150100.3.5.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP1-LTSS:dnsdist-1.8.0-150100.3.5.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:dnsdist-1.8.0-150100.3.5.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:dnsdist-1.8.0-150100.3.5.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:dnsdist-1.8.0-150100.3.5.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:dnsdist-1.8.0-150100.3.5.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP1:dnsdist-1.8.0-150100.3.5.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:dnsdist-1.8.0-150100.3.5.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2023-07-04T08:39:57Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2018-14663"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…