5 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7 High
AI Score
Confidence
Low
0.003 Low
EPSS
Percentile
70.2%
Package : pdns
Version : 3.4.1-4+deb8u10
CVE ID : CVE-2019-10162 CVE-2019-10163
Two vulnerabilities have been discovered in pdns, an authoritative DNS
server which may result in denial of service via malformed zone records
and excessive NOTIFY packets in a master/slave setup.
CVE-2019-10162
An issue has been found in PowerDNS Authoritative Server allowing
an authorized user to cause the server to exit by inserting a
crafted record in a MASTER type zone under their control. The issue
is due to the fact that the Authoritative Server will exit when it
runs into a parsing error while looking up the NS/A/AAAA records it
is about to use for an outgoing notify.
CVE-2019-10163
An issue has been found in PowerDNS Authoritative Server allowing
a remote, authorized master server to cause a high CPU load or even
prevent any further updates to any slave zone by sending a large
number of NOTIFY messages. Note that only servers configured as
slaves are affected by this issue.
For Debian 8 "Jessie", these problems have been fixed in version
3.4.1-4+deb8u10.
We recommend that you upgrade your pdns packages.
For the detailed security status of pdns please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/pdns
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
Jonas Meurer
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 9 | armel | pdns-server-dbgsym | < 4.0.3-1+deb9u5 | pdns-server-dbgsym_4.0.3-1+deb9u5_armel.deb |
Debian | 9 | mips64el | pdns-backend-sqlite3 | < 4.0.3-1+deb9u5 | pdns-backend-sqlite3_4.0.3-1+deb9u5_mips64el.deb |
Debian | 8 | armel | pdns-backend-lua | < 3.4.1-4+deb8u10 | pdns-backend-lua_3.4.1-4+deb8u10_armel.deb |
Debian | 9 | mips | pdns-backend-remote-dbgsym | < 4.0.3-1+deb9u5 | pdns-backend-remote-dbgsym_4.0.3-1+deb9u5_mips.deb |
Debian | 8 | armhf | pdns-server | < 3.4.1-4+deb8u10 | pdns-server_3.4.1-4+deb8u10_armhf.deb |
Debian | 9 | s390x | pdns-backend-bind-dbgsym | < 4.0.3-1+deb9u5 | pdns-backend-bind-dbgsym_4.0.3-1+deb9u5_s390x.deb |
Debian | 9 | armel | pdns-backend-bind-dbgsym | < 4.0.3-1+deb9u5 | pdns-backend-bind-dbgsym_4.0.3-1+deb9u5_armel.deb |
Debian | 8 | i386 | pdns-backend-lua | < 3.4.1-4+deb8u10 | pdns-backend-lua_3.4.1-4+deb8u10_i386.deb |
Debian | 9 | amd64 | pdns-backend-lua | < 4.0.3-1+deb9u5 | pdns-backend-lua_4.0.3-1+deb9u5_amd64.deb |
Debian | 9 | s390x | pdns-backend-geoip | < 4.0.3-1+deb9u5 | pdns-backend-geoip_4.0.3-1+deb9u5_s390x.deb |
5 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7 High
AI Score
Confidence
Low
0.003 Low
EPSS
Percentile
70.2%