PowerDNS < 2.9.17 Multiple DoS

Medium Nessus Plugin ID 87944


The remote name server is affected by multiple denial of service vulnerabilities.


According to its self-reported version number, the version of the PowerDNS service listening on the remote host is prior to 2.9.17. It is, therefore, affected by multiple denial of service vulnerabilities :

- A denial of service vulnerability exists due to a flaw that is triggered when the server receives a compressed DNS packet with a label length byte with an incorrect offset. A remote attacker can exploit this to trigger an infinite loop, resulting in a denial of service condition. (CVE-2005-0038)

- An unspecified flaw exists in the DNSPacket::expand() method in dnspacket.cc. A emote attacker can exploit flaw, by sending a random stream of bytes, to cause a denial of service condition. (CVE-2005-0428)

Note that Nessus has not attempted to exploit these issues but has instead relied only on the application's self-reported version number.


Upgrade to PowerDNS version 2.9.17 or later.

See Also


Plugin Details

Severity: Medium

ID: 87944

File Name: powerdns_2_9_17.nasl

Version: 1.3

Type: remote

Family: DNS

Published: 2016/01/15

Modified: 2018/07/25

Dependencies: 34043

Risk Information

Risk Factor: Medium

CVSS v2.0

Base Score: 5

Temporal Score: 3.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:powerdns:powerdns

Required KB Items: pdns/version, pdns/version_full, pdns/version_source, Settings/ParanoidReport

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2005/05/02

Vulnerability Publication Date: 2005/05/02

Reference Information

CVE: CVE-2005-0038, CVE-2005-0428

BID: 13729