![]() |
Inicial ▼ Bookkeeping
Online ▼ Auditorias ▼
DNS
Administrado ▼
Acerca de DNS
Ordenar/Renovar
Preguntas Frecuentes
AUP
Dynamic DNS Clients
Configurar Dominios Dynamic DNS Update Password Monitoreo
de Redes ▼
Enterprise
Avanzado
Estándarr
Prueba
Preguntas Frecuentes
Resumen de Precio/Funciones
Ordenar
Muestras
Configure/Status Alert Profiles | ||
ID de Prueba: | 1.3.6.1.4.1.25623.1.0.112376 |
Categoría: | Denial of Service |
Título: | PowerDNS Security Advisory 2015-03: Packet parsing bug can lead to crashes |
Resumen: | A bug was found using afl-fuzz in our packet parsing code.; This bug, when exploited, causes an assertion error and consequent termination of the pdns_server process,; causing a Denial of Service.;; When the PowerDNS Authoritative Server is run inside the guardian (--guardian), or inside a supervisor like; supervisord or systemd, it will be automatically restarted, limiting the impact to a somewhat degraded service. |
Descripción: | Summary: A bug was found using afl-fuzz in our packet parsing code. This bug, when exploited, causes an assertion error and consequent termination of the pdns_server process, causing a Denial of Service. When the PowerDNS Authoritative Server is run inside the guardian (--guardian), or inside a supervisor like supervisord or systemd, it will be automatically restarted, limiting the impact to a somewhat degraded service. Affected Software/OS: PowerDNS Authoritative Server 3.4.4 up to and including 3.4.6 are affected. Solution: Update PowerDNS Authoritative Server to version 3.4.7. CVSS Score: 5.0 CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P |
Referencia Cruzada: |
Common Vulnerability Exposure (CVE) ID: CVE-2015-5311 http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171976.html http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171865.html http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172193.html http://www.openwall.com/lists/oss-security/2015/11/09/3 http://www.securitytracker.com/id/1034098 |
Copyright | Copyright (C) 2018 Greenbone AG |
Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa. Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora. |