GLSA-200812-19 : PowerDNS: Multiple vulnerabilities

This script is Copyright (C) 2008-2016 Tenable Network Security, Inc.

Synopsis :

The remote Gentoo host is missing one or more security-related

Description :

The remote host is affected by the vulnerability described in GLSA-200812-19
(PowerDNS: Multiple vulnerabilities)

Daniel Drown reported an error when receiving a HINFO CH query
(CVE-2008-5277). Brian J. Dowling of Simplicity Communications
discovered a previously unknown security implication of the PowerDNS
behavior to not respond to certain queries it considers malformed

Impact :

A remote attacker could send specially crafted queries to cause a
Denial of Service. The second vulnerability in itself does not pose a
security risk to PowerDNS Nameserver. However, not answering a query
for an invalid DNS record within a valid domain allows for a larger
spoofing window on third-party nameservers for domains being hosted by
PowerDNS Nameserver itself.

Workaround :

There is no known workaround at this time.

See also :

Solution :

All PowerDNS users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose '>=net-dns/pdns-'

Risk factor :

Medium / CVSS Base Score : 6.4
CVSS Temporal Score : 5.6
Public Exploit Available : false

Family: Gentoo Local Security Checks

Nessus Plugin ID: 35244 (gentoo_GLSA-200812-19.nasl)

Bugtraq ID: 30587

CVE ID: CVE-2008-3337

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now