Vulnerability CVE-2019-10162


Published: 2019-07-30   Modified: 2019-07-31

Description:
A vulnerability has been found in PowerDNS Authoritative Server before versions 4.1.10, 4.0.8 allowing an authorized user to cause the server to exit by inserting a crafted record in a MASTER type zone under their control. The issue is due to the fact that the Authoritative Server will exit when it runs into a parsing error while looking up the NS/A/AAAA records it is about to use for an outgoing notify.

Type:

CWE-285

(Improper Authorization)

CVSS2 => (AV:N/AC:L/Au:N/C:N/I:N/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
5/10
2.9/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
None
None
Partial
Affected software
Powerdns -> Authoritative 

 References:
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00036.html
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00054.html
https://blog.powerdns.com/2019/06/21/powerdns-authoritative-server-4-0-8-and-4-1-10-released/
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10162
https://doc.powerdns.com/authoritative/security-advisories/powerdns-advisory-2019-04.html

Copyright 2024, cxsecurity.com

 

Back to Top