Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
145615 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.112376
Categoría:Denial of Service
Título:PowerDNS Security Advisory 2015-03: Packet parsing bug can lead to crashes
Resumen:A bug was found using afl-fuzz in our packet parsing code.; This bug, when exploited, causes an assertion error and consequent termination of the pdns_server process,; causing a Denial of Service.;; When the PowerDNS Authoritative Server is run inside the guardian (--guardian), or inside a supervisor like; supervisord or systemd, it will be automatically restarted, limiting the impact to a somewhat degraded service.
Descripción:Summary:
A bug was found using afl-fuzz in our packet parsing code.
This bug, when exploited, causes an assertion error and consequent termination of the pdns_server process,
causing a Denial of Service.

When the PowerDNS Authoritative Server is run inside the guardian (--guardian), or inside a supervisor like
supervisord or systemd, it will be automatically restarted, limiting the impact to a somewhat degraded service.

Affected Software/OS:
PowerDNS Authoritative Server 3.4.4 up to and including 3.4.6 are affected.

Solution:
Update PowerDNS Authoritative Server to version 3.4.7.

CVSS Score:
5.0

CVSS Vector:
AV:N/AC:L/Au:N/C:N/I:N/A:P

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2015-5311
http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171976.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171865.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172193.html
http://www.openwall.com/lists/oss-security/2015/11/09/3
http://www.securitytracker.com/id/1034098
CopyrightCopyright (C) 2018 Greenbone AG

Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.