Lucene search

K
archlinuxArchLinuxASA-202107-73
HistoryJul 27, 2021 - 12:00 a.m.

[ASA-202107-73] powerdns: denial of service

2021-07-2700:00:00
security.archlinux.org
231
powerdns server
denial of service
vulnerability
fix
4.5.0
upgrade
dns server

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

EPSS

0.026

Percentile

90.3%

Arch Linux Security Advisory ASA-202107-73

Severity: Medium
Date : 2021-07-27
CVE-ID : CVE-2021-36754
Package : powerdns
Type : denial of service
Remote : Yes
Link : https://security.archlinux.org/AVG-2222

Summary

The package powerdns before version 4.5.1-1 is vulnerable to denial of
service.

Resolution

Upgrade to 4.5.1-1.

pacman -Syu “powerdns>=4.5.1-1”

The problem has been fixed upstream in version 4.5.1.

Workaround

Users that cannot upgrade immediately, but do have dnsdist in place,
can use dnsdist to filter such queries before they do harm, with
something like addAction(QTypeRule(65535),
RCodeAction(DNSRCode.REFUSED)).

Description

PowerDNS Authoritative Server 4.5.0 will crash with an uncaught out of
bounds exception if it receives a query with QTYPE 65535. The offending
code was not present in earlier versions, and they are not affected.

Users that cannot upgrade immediately, but do have dnsdist in place,
can use dnsdist to filter such queries before they do harm, with
something like addAction(QTypeRule(65535),
RCodeAction(DNSRCode.REFUSED)).

When the PowerDNS Authoritative Server is run inside a supervisor like
supervisord or systemd, an uncaught exception crash will lead to an
automatic restart, limiting the impact to a somewhat degraded service.

Impact

A remote attacker could crash the DNS server with a crafted query.

References

https://doc.powerdns.com/authoritative/security-advisories/powerdns-advisory-2021-01.html
https://downloads.powerdns.com/patches/2021-01/pdns-4.5.0-2021-01.patch
https://github.com/PowerDNS/pdns/commit/96cae2fd21054b383a16c569a363a50f71808cd9
https://security.archlinux.org/CVE-2021-36754

OSVersionArchitecturePackageVersionFilename
ArchLinuxanyanypowerdns< 4.5.1-1UNKNOWN

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

EPSS

0.026

Percentile

90.3%