|
Message-ID: <6fc5f0dc8f6d868e9dcf4fc2d3bc535ef8907c3c.camel@powerdns.com>
Date: Wed, 24 Apr 2024 12:37:56 +0200
From: Peter van Dijk <peter.van.dijk@...erdns.com>
To: oss-security@...ts.openwall.com
Subject: PowerDNS Recursor Security Advisory 2024-02: if recursive
forwarding is configured, crafted responses can lead to a denial of service
in Recursor
Dear user,
Please find below a security advisory, relating to PowerDNS Recursor
4.8.7, 4.9.4 and 5.0.3 only.
When using recursive forwarding, a crafted response from an upstream
server can cause a Denial of Service in the Recursor.
=========================================================================
PowerDNS Security Advisory 2024-02: if recursive forwarding is
configured, crafted responses can lead to a denial of service in Recursor
CVE: CVE-2024-25583
Date: 24th of April 2024.
Affects: PowerDNS Recursor 4.8.7, 4.9.4 and 5.0.3, earlier versions
are not affected
Not affected: PowerDNS Recursor 4.8.8, 4.9.5 and 5.0.4
Severity: High (only when using recursive forwarding)
Impact: Denial of service
Exploit: This problem can be triggered by an attacker publishing a crafted zone
Risk of system compromise: None
Solution: Upgrade to patched version
When using recursive forwarding, a crafted response from an upstream
server can cause a Denial of Service in the Recursor. The default
configuration of the Recursor does not use recursive forwarding and is
not affected.
CVSS Score: 7.5, only for configurations using recursive forwarding, see
https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H&version=3.1
The remedy is to update to a patched version.
Download attachment "signature.asc" of type "application/pgp-signature" (915 bytes)
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.