PowerDNS < 2.9.18 Multiple Vulnerabilities

Medium Nessus Plugin ID 87945


The remote name server is affected by multiple vulnerabilities.


According to its self-reported version number, the version of the PowerDNS service listening on the remote host is prior to 2.9.18. It is, therefore, affected by multiple vulnerabilities :

- A flaw exists due to improper escaping of LDAP queries.
A remote attacker can exploit this to cause a denial of service condition or to conduct LDAP injection attacks.

- A denial of service vulnerability exists when allowing recursion to a restricted range of IP addresses due to improper handling of questions from clients that are denied a recursion. An attacker can exploit this to prevent answers to those clients that are allowed to use recursion. (CVE-2005-2302)

Note that Nessus has not attempted to exploit these issues but has instead relied only on the application's self-reported version number.


Upgrade to PowerDNS version 2.9.18 or later.

See Also


Plugin Details

Severity: Medium

ID: 87945

File Name: powerdns_2_9_18.nasl

Version: 1.3

Type: remote

Family: DNS

Published: 2016/01/15

Updated: 2018/07/25

Dependencies: 34043

Risk Information

Risk Factor: Medium

CVSS v2.0

Base Score: 5

Temporal Score: 3.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:powerdns:powerdns

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2005/07/16

Vulnerability Publication Date: 2005/07/16

Reference Information

CVE: CVE-2005-2301, CVE-2005-2302

BID: 14290, 14291