![]() |
Inicial ▼ Bookkeeping
Online ▼ Auditorias ▼
DNS
Administrado ▼
Acerca de DNS
Ordenar/Renovar
Preguntas Frecuentes
AUP
Dynamic DNS Clients
Configurar Dominios Dynamic DNS Update Password Monitoreo
de Redes ▼
Enterprise
Avanzado
Estándarr
Prueba
Preguntas Frecuentes
Resumen de Precio/Funciones
Ordenar
Muestras
Configure/Status Alert Profiles | ||
ID de Prueba: | 1.3.6.1.4.1.25623.1.0.108608 |
Categoría: | Denial of Service |
Título: | PowerDNS Authoritative Server NOTIFY Packets Denial of Service Vulnerability |
Resumen: | PowerDNS Authoritative Server is prone to a Denial of Service; via NOTIFY packets. |
Descripción: | Summary: PowerDNS Authoritative Server is prone to a Denial of Service via NOTIFY packets. Vulnerability Impact: This flaw allows a remote, authorized master server to cause a high CPU load or even prevent any further updates to any slave zone by sending a large number of NOTIFY messages. Note that only servers configured as slaves are affected by this issue. Affected Software/OS: PowerDNS Authoritative before version 4.0.8 and 4.1.x up to and including 4.1.8. Solution: Upgrade to version 4.0.8, 4.1.9 or later. CVSS Score: 4.0 CVSS Vector: AV:N/AC:L/Au:S/C:N/I:N/A:P |
Referencia Cruzada: |
Common Vulnerability Exposure (CVE) ID: CVE-2019-10163 https://blog.powerdns.com/2019/06/21/powerdns-authoritative-server-4-0-8-and-4-1-10-released/ https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10163 https://doc.powerdns.com/authoritative/security-advisories/powerdns-advisory-2019-05.html SuSE Security Announcement: openSUSE-SU-2019:1904 (Google Search) http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00036.html SuSE Security Announcement: openSUSE-SU-2019:1921 (Google Search) http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00054.html |
Copyright | Copyright (C) 2019 Greenbone Networks GmbH |
Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa. Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora. |