Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.149470
Category:Denial of Service
Title:PowerDNS Recursor DoS Vulnerability (2023-02)
Summary:PowerDNS Recursor is prone to a denial of service (DoS); vulnerability.
Description:Summary:
PowerDNS Recursor is prone to a denial of service (DoS)
vulnerability.

Vulnerability Insight:
When the recursor detects and deters a spoofing attempt or
receives certain malformed DNS packets, it throttles the server that was the target of the
impersonation attempt so that other authoritative servers for the same zone will be more likely
to be used in the future, in case the attacker controls the path to one server only.
Unfortunately this mechanism can be used by an attacker with the ability to send queries to the
recursor, guess the correct source port of the corresponding outgoing query and inject packets
with a spoofed IP address to force the recursor to mark specific authoritative servers as not
available, leading a denial of service for the zones served by those servers.

Affected Software/OS:
PowerDNS Recursor version 4.6.5 and prior, 4.7.x through 4.7.4
and 4.8.x through 4.8.3.

Solution:
Update to version 4.6.6, 4.7.5, 4.8.4 or later.

CVSS Score:
5.0

CVSS Vector:
AV:N/AC:L/Au:N/C:N/I:N/A:P

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2023-26437
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CN7VMRYKZHG2UDUAK326LXD3JY7NO3LR/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IHPD6SIQOG7245GXFQHPUEI4AZ6Y3KD6/
https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2023-02.html
CopyrightCopyright (C) 2023 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.