PowerDNS Recursor 3.x < 3.0.1 EDNS0 DoS
Medium Nessus Plugin ID 87948
SynopsisThe remote name server is affected by a denial of service vulnerability.
DescriptionAccording to its self-reported version number, the version of the PowerDNS Recursor listening on the remote host is version 3.x prior to 3.0.1. It is, therefore, affected by a denial of service vulnerability due to improper processing of Extension Mechanisms for DNS (EDNS0) packets. A remote attacker can exploit this vulnerability, via specially crafted EDNS0 packets, to cause an application crash, resulting in a denial of service condition.
Note that Nessus has not attempted to exploit this issue but has instead relied only on the application's self-reported version number.
Also, Nessus has not checked for the presence of the patch.
SolutionUpgrade to PowerDNS Recursor 3.0.1 or later. Alternatively, apply the patch referenced in the vendor advisory.