PowerDNS < 2.9.17 Multiple DoS

medium Nessus Plugin ID 87944


The remote name server is affected by multiple denial of service vulnerabilities.


According to its self-reported version number, the version of the PowerDNS service listening on the remote host is prior to 2.9.17. It is, therefore, affected by multiple denial of service vulnerabilities :

- A denial of service vulnerability exists due to a flaw that is triggered when the server receives a compressed DNS packet with a label length byte with an incorrect offset. A remote attacker can exploit this to trigger an infinite loop, resulting in a denial of service condition. (CVE-2005-0038)

- An unspecified flaw exists in the DNSPacket::expand() method in dnspacket.cc. A emote attacker can exploit flaw, by sending a random stream of bytes, to cause a denial of service condition. (CVE-2005-0428)

Note that Nessus has not attempted to exploit these issues but has instead relied only on the application's self-reported version number.


Upgrade to PowerDNS version 2.9.17 or later.

See Also


Plugin Details

Severity: Medium

ID: 87944

File Name: powerdns_2_9_17.nasl

Version: 1.3

Type: remote

Family: DNS

Published: 1/15/2016

Updated: 7/25/2018

Configuration: Enable paranoid mode

Supported Sensors: Nessus

Risk Information


Risk Factor: Low

Score: 3.6


Risk Factor: Medium

Base Score: 5

Temporal Score: 3.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Information

CPE: cpe:/a:powerdns:powerdns

Required KB Items: Settings/ParanoidReport, pdns/version, pdns/version_full, pdns/version_source

Exploit Ease: No known exploits are available

Patch Publication Date: 5/2/2005

Vulnerability Publication Date: 5/2/2005

Reference Information

CVE: CVE-2005-0038, CVE-2005-0428

BID: 13729