Lucene search

K
mageiaGentoo FoundationMGASA-2019-0122
HistoryMar 29, 2019 - 6:51 p.m.

Updated pdns packages fix security vulnerability

2019-03-2918:51:06
Gentoo Foundation
advisories.mageia.org
9

0.01 Low

EPSS

Percentile

83.6%

Updated pdns packages fix security vulnerability: An issue has been found in PowerDNS Authoritative Server when the HTTP remote backend is used in RESTful mode (without post=1 set), allowing a remote user to cause the HTTP backend to connect to an attacker-specified host instead of the configured one, via a crafted DNS query. This can be used to cause a denial of service by preventing the remote backend from getting a response, content spoofing if the attacker can time its own query so that subsequent queries will use an attacker-controlled HTTP server instead of the configured one, and possibly information disclosure if the Authoritative Server has access to internal servers (CVE-2019-3871).

OSVersionArchitecturePackageVersionFilename
Mageia6noarchpdns< 4.1.7-1pdns-4.1.7-1.mga6