Lucene search

K
cvelistRedhatCVELIST:CVE-2019-3871
HistoryMar 21, 2019 - 8:42 p.m.

CVE-2019-3871

2019-03-2120:42:35
CWE-20
redhat
www.cve.org

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

LOW

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L

8.2 High

AI Score

Confidence

High

0.01 Low

EPSS

Percentile

83.8%

A vulnerability was found in PowerDNS Authoritative Server before 4.0.7 and before 4.1.7. An insufficient validation of data coming from the user when building a HTTP request from a DNS query in the HTTP Connector of the Remote backend, allowing a remote user to cause a denial of service by making the server connect to an invalid endpoint, or possibly information disclosure by making the server connect to an internal endpoint and somehow extracting meaningful information about the response

CNA Affected

[
  {
    "product": "pdns",
    "vendor": "The PowerDNS Project",
    "versions": [
      {
        "status": "affected",
        "version": "4.1.7"
      },
      {
        "status": "affected",
        "version": "4.0.7"
      }
    ]
  }
]

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

LOW

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L

8.2 High

AI Score

Confidence

High

0.01 Low

EPSS

Percentile

83.8%