ID OPENVAS:54477 Type openvas Reporter Copyright (c) 2005 E-Soft Inc. http://www.securityspace.com Modified 2017-07-07T00:00:00
Description
The remote host is missing an update to pdns
announced via advisory DSA 771-1.
Several problems have been discovered in pdns, a versatile nameserver
that can lead to a denial of service. The Common Vulnerabilities and
Exposures project identifies the following problems:
CVE-2005-2301
Norbert Sendetzky and Jan de Groot discoverd that the LDAP backend
did not properly escape all queries, allowing it to fail and not
answer queries anymore.
CVE-2005-2302
Wilco Baan discovered that queries from clients without recursion
permission can temporarily blank out domains to clients with
recursion permitted. This enables outside users to blank out a
domain temporarily to normal users.
The old stable distribution (woody) does not contain pdns packages.
# OpenVAS Vulnerability Test
# $Id: deb_771_1.nasl 6616 2017-07-07 12:10:49Z cfischer $
# Description: Auto-generated from advisory DSA 771-1
#
# Authors:
# Thomas Reinke <reinke@securityspace.com>
#
# Copyright:
# Copyright (c) 2007 E-Soft Inc. http://www.securityspace.com
# Text descriptions are largerly excerpted from the referenced
# advisory, and are Copyright (c) the respective author(s)
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License version 2,
# as published by the Free Software Foundation
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
#
include("revisions-lib.inc");
tag_solution = "For the stable distribution (sarge) these problems have been fixed in
version 2.9.17-13sarge1.
For the unstable distribution (sid) these problems have been fixed in
version 2.9.18-1.
We recommend that you upgrade your pdns package.
https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20771-1";
tag_summary = "The remote host is missing an update to pdns
announced via advisory DSA 771-1.
Several problems have been discovered in pdns, a versatile nameserver
that can lead to a denial of service. The Common Vulnerabilities and
Exposures project identifies the following problems:
CVE-2005-2301
Norbert Sendetzky and Jan de Groot discoverd that the LDAP backend
did not properly escape all queries, allowing it to fail and not
answer queries anymore.
CVE-2005-2302
Wilco Baan discovered that queries from clients without recursion
permission can temporarily blank out domains to clients with
recursion permitted. This enables outside users to blank out a
domain temporarily to normal users.
The old stable distribution (woody) does not contain pdns packages.";
if(description)
{
script_id(54477);
script_version("$Revision: 6616 $");
script_tag(name:"last_modification", value:"$Date: 2017-07-07 14:10:49 +0200 (Fri, 07 Jul 2017) $");
script_tag(name:"creation_date", value:"2008-01-17 23:00:53 +0100 (Thu, 17 Jan 2008)");
script_cve_id("CVE-2005-2301", "CVE-2005-2302");
script_tag(name:"cvss_base", value:"5.0");
script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:N/I:N/A:P");
script_name("Debian Security Advisory DSA 771-1 (pdns)");
script_category(ACT_GATHER_INFO);
script_copyright("Copyright (c) 2005 E-Soft Inc. http://www.securityspace.com");
script_family("Debian Local Security Checks");
script_dependencies("gather-package-list.nasl");
script_mandatory_keys("ssh/login/debian_linux", "ssh/login/packages");
script_tag(name : "solution" , value : tag_solution);
script_tag(name : "summary" , value : tag_summary);
script_tag(name:"qod_type", value:"package");
script_tag(name:"solution_type", value:"VendorFix");
exit(0);
}
#
# The script code starts here
#
include("pkg-lib-deb.inc");
res = "";
report = "";
if ((res = isdpkgvuln(pkg:"pdns-doc", ver:"2.9.17-13sarge1", rls:"DEB3.1")) != NULL) {
report += res;
}
if ((res = isdpkgvuln(pkg:"pdns", ver:"2.9.17-13sarge1", rls:"DEB3.1")) != NULL) {
report += res;
}
if ((res = isdpkgvuln(pkg:"pdns-backend-geo", ver:"2.9.17-13sarge1", rls:"DEB3.1")) != NULL) {
report += res;
}
if ((res = isdpkgvuln(pkg:"pdns-backend-ldap", ver:"2.9.17-13sarge1", rls:"DEB3.1")) != NULL) {
report += res;
}
if ((res = isdpkgvuln(pkg:"pdns-backend-mysql", ver:"2.9.17-13sarge1", rls:"DEB3.1")) != NULL) {
report += res;
}
if ((res = isdpkgvuln(pkg:"pdns-backend-pgsql", ver:"2.9.17-13sarge1", rls:"DEB3.1")) != NULL) {
report += res;
}
if ((res = isdpkgvuln(pkg:"pdns-backend-pipe", ver:"2.9.17-13sarge1", rls:"DEB3.1")) != NULL) {
report += res;
}
if ((res = isdpkgvuln(pkg:"pdns-backend-sqlite", ver:"2.9.17-13sarge1", rls:"DEB3.1")) != NULL) {
report += res;
}
if ((res = isdpkgvuln(pkg:"pdns-recursor", ver:"2.9.17-13sarge1", rls:"DEB3.1")) != NULL) {
report += res;
}
if ((res = isdpkgvuln(pkg:"pdns-server", ver:"2.9.17-13sarge1", rls:"DEB3.1")) != NULL) {
report += res;
}
if (report != "") {
security_message(data:report);
} else if (__pkg_match) {
exit(99); # Not vulnerable.
}
{"bulletinFamily": "scanner", "viewCount": 0, "naslFamily": "Debian Local Security Checks", "reporter": "Copyright (c) 2005 E-Soft Inc. http://www.securityspace.com", "references": [], "description": "The remote host is missing an update to pdns\nannounced via advisory DSA 771-1.\n\nSeveral problems have been discovered in pdns, a versatile nameserver\nthat can lead to a denial of service. The Common Vulnerabilities and\nExposures project identifies the following problems:\n\nCVE-2005-2301\n\nNorbert Sendetzky and Jan de Groot discoverd that the LDAP backend\ndid not properly escape all queries, allowing it to fail and not\nanswer queries anymore.\n\nCVE-2005-2302\n\nWilco Baan discovered that queries from clients without recursion\npermission can temporarily blank out domains to clients with\nrecursion permitted. This enables outside users to blank out a\ndomain temporarily to normal users.\n\nThe old stable distribution (woody) does not contain pdns packages.", "hashmap": [{"key": "bulletinFamily", "hash": "bbdaea376f500d25f6b0c1050311dd07"}, {"key": "cvelist", "hash": "64b6344ee06a7fa7ab8a65355bbb5c0e"}, {"key": "cvss", "hash": "84813b1457b92d6ba1174abffbb83a2f"}, {"key": "description", "hash": "9ba8f03cf0df35dad969d4537ba96977"}, {"key": "href", "hash": "641f9abb7f44065c093acbc74b66d407"}, {"key": "modified", "hash": "d89cc672a6266551218ef8145d1f22e2"}, {"key": "naslFamily", "hash": "74562d71b087df9eabd0c21f99b132cc"}, {"key": "pluginID", "hash": "f1197f377c8fa43ffd0eb3d945d35e07"}, {"key": "published", "hash": "d50ef4187c812efcd7df8d6f70c1cb0e"}, {"key": "references", "hash": "d41d8cd98f00b204e9800998ecf8427e"}, {"key": "reporter", "hash": "bd0c646e06156cd71a2e5bbae48ef94c"}, {"key": "sourceData", "hash": "e197cdfcf236245f9b3b2db9a5bd440d"}, {"key": "title", "hash": "ec171561cab776a004f394f1263bcc95"}, {"key": "type", "hash": "47c1f692ea47a21f716dad07043ade01"}], "href": "http://plugins.openvas.org/nasl.php?oid=54477", "modified": "2017-07-07T00:00:00", "objectVersion": "1.3", "enchantments": {"score": {"value": 6.0, "vector": "NONE", "modified": "2017-07-24T12:50:15"}, "dependencies": {"references": [{"type": "cve", "idList": ["CVE-2005-2302", "CVE-2005-2301"]}, {"type": "nessus", "idList": ["POWERDNS_2_9_18.NASL", "DEBIAN_DSA-771.NASL", "FREEBSD_PKG_43A7B0A7F9BC11D9B47300061BC2AD93.NASL", "DEBIAN_DSA-773.NASL"]}, {"type": "debian", "idList": ["DEBIAN:DSA-771-1:E137F"]}, {"type": "openvas", "idList": ["OPENVAS:54410"]}, {"type": "osvdb", "idList": ["OSVDB:18003", "OSVDB:18004"]}, {"type": "freebsd", "idList": ["43A7B0A7-F9BC-11D9-B473-00061BC2AD93"]}], "modified": "2017-07-24T12:50:15"}, "vulnersScore": 6.0}, "id": "OPENVAS:54477", "title": "Debian Security Advisory DSA 771-1 (pdns)", "hash": "fe43f98b0f94fc852e01a448508c75b661bd2981acad33e65e6f6376fa8a267a", "edition": 2, "published": "2008-01-17T00:00:00", "type": "openvas", "history": [{"lastseen": "2017-07-02T21:10:23", "bulletin": {"hash": "db74f2d0492113ada6007e4723d92d2451bb8653a99b62bda0a8ccd00764a79e", "viewCount": 0, "reporter": "Copyright (c) 2005 E-Soft Inc. http://www.securityspace.com", "references": [], "description": "The remote host is missing an update to pdns\nannounced via advisory DSA 771-1.\n\nSeveral problems have been discovered in pdns, a versatile nameserver\nthat can lead to a denial of service. The Common Vulnerabilities and\nExposures project identifies the following problems:\n\nCVE-2005-2301\n\nNorbert Sendetzky and Jan de Groot discoverd that the LDAP backend\ndid not properly escape all queries, allowing it to fail and not\nanswer queries anymore.\n\nCVE-2005-2302\n\nWilco Baan discovered that queries from clients without recursion\npermission can temporarily blank out domains to clients with\nrecursion permitted. This enables outside users to blank out a\ndomain temporarily to normal users.\n\nThe old stable distribution (woody) does not contain pdns packages.", "hashmap": [{"key": "reporter", "hash": "bd0c646e06156cd71a2e5bbae48ef94c"}, {"key": "references", "hash": "d41d8cd98f00b204e9800998ecf8427e"}, {"key": "href", "hash": "641f9abb7f44065c093acbc74b66d407"}, {"key": "pluginID", "hash": "f1197f377c8fa43ffd0eb3d945d35e07"}, {"key": "type", "hash": "47c1f692ea47a21f716dad07043ade01"}, {"key": "bulletinFamily", "hash": "bbdaea376f500d25f6b0c1050311dd07"}, {"key": "description", "hash": "9ba8f03cf0df35dad969d4537ba96977"}, {"key": "sourceData", "hash": "37a6e4ab59a0cf22a7a519227a019fc1"}, {"key": "cvelist", "hash": "64b6344ee06a7fa7ab8a65355bbb5c0e"}, {"key": "cvss", "hash": "84813b1457b92d6ba1174abffbb83a2f"}, {"key": "title", "hash": "ec171561cab776a004f394f1263bcc95"}, {"key": "naslFamily", "hash": "74562d71b087df9eabd0c21f99b132cc"}, {"key": "modified", "hash": "782af1722d6c251ca784cd8cb6206941"}, {"key": "published", "hash": "d50ef4187c812efcd7df8d6f70c1cb0e"}], "naslFamily": "Debian Local Security Checks", "modified": "2016-09-12T00:00:00", "objectVersion": "1.3", "href": "http://plugins.openvas.org/nasl.php?oid=54477", "published": "2008-01-17T00:00:00", "enchantments": {}, "id": "OPENVAS:54477", "title": "Debian Security Advisory DSA 771-1 (pdns)", "bulletinFamily": "scanner", "edition": 1, "sourceData": "# OpenVAS Vulnerability Test\n# $Id: deb_771_1.nasl 4025 2016-09-12 05:23:55Z teissa $\n# Description: Auto-generated from advisory DSA 771-1\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2007 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largerly excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_solution = \"For the stable distribution (sarge) these problems have been fixed in\nversion 2.9.17-13sarge1.\n\nFor the unstable distribution (sid) these problems have been fixed in\nversion 2.9.18-1.\n\nWe recommend that you upgrade your pdns package.\n\n https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20771-1\";\ntag_summary = \"The remote host is missing an update to pdns\nannounced via advisory DSA 771-1.\n\nSeveral problems have been discovered in pdns, a versatile nameserver\nthat can lead to a denial of service. The Common Vulnerabilities and\nExposures project identifies the following problems:\n\nCVE-2005-2301\n\nNorbert Sendetzky and Jan de Groot discoverd that the LDAP backend\ndid not properly escape all queries, allowing it to fail and not\nanswer queries anymore.\n\nCVE-2005-2302\n\nWilco Baan discovered that queries from clients without recursion\npermission can temporarily blank out domains to clients with\nrecursion permitted. This enables outside users to blank out a\ndomain temporarily to normal users.\n\nThe old stable distribution (woody) does not contain pdns packages.\";\n\n\nif(description)\n{\n script_id(54477);\n script_version(\"$Revision: 4025 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2016-09-12 07:23:55 +0200 (Mon, 12 Sep 2016) $\");\n script_tag(name:\"creation_date\", value:\"2008-01-17 23:00:53 +0100 (Thu, 17 Jan 2008)\");\n script_cve_id(\"CVE-2005-2301\", \"CVE-2005-2302\");\n script_tag(name:\"cvss_base\", value:\"5.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_name(\"Debian Security Advisory DSA 771-1 (pdns)\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2005 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Debian Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"HostDetails/OS/cpe:/o:debian:debian_linux\", \"login/SSH/success\", \"ssh/login/packages\");\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-deb.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isdpkgvuln(pkg:\"pdns-doc\", ver:\"2.9.17-13sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"pdns\", ver:\"2.9.17-13sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"pdns-backend-geo\", ver:\"2.9.17-13sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"pdns-backend-ldap\", ver:\"2.9.17-13sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"pdns-backend-mysql\", ver:\"2.9.17-13sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"pdns-backend-pgsql\", ver:\"2.9.17-13sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"pdns-backend-pipe\", ver:\"2.9.17-13sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"pdns-backend-sqlite\", ver:\"2.9.17-13sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"pdns-recursor\", ver:\"2.9.17-13sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"pdns-server\", ver:\"2.9.17-13sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "type": "openvas", "history": [], "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}, "cvelist": ["CVE-2005-2301", "CVE-2005-2302"], "lastseen": "2017-07-02T21:10:23", "pluginID": "54477"}, "differentElements": ["modified", "sourceData"], "edition": 1}], "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}, "cvelist": ["CVE-2005-2301", "CVE-2005-2302"], "lastseen": "2017-07-24T12:50:15", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: deb_771_1.nasl 6616 2017-07-07 12:10:49Z cfischer $\n# Description: Auto-generated from advisory DSA 771-1\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2007 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largerly excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_solution = \"For the stable distribution (sarge) these problems have been fixed in\nversion 2.9.17-13sarge1.\n\nFor the unstable distribution (sid) these problems have been fixed in\nversion 2.9.18-1.\n\nWe recommend that you upgrade your pdns package.\n\n https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20771-1\";\ntag_summary = \"The remote host is missing an update to pdns\nannounced via advisory DSA 771-1.\n\nSeveral problems have been discovered in pdns, a versatile nameserver\nthat can lead to a denial of service. The Common Vulnerabilities and\nExposures project identifies the following problems:\n\nCVE-2005-2301\n\nNorbert Sendetzky and Jan de Groot discoverd that the LDAP backend\ndid not properly escape all queries, allowing it to fail and not\nanswer queries anymore.\n\nCVE-2005-2302\n\nWilco Baan discovered that queries from clients without recursion\npermission can temporarily blank out domains to clients with\nrecursion permitted. This enables outside users to blank out a\ndomain temporarily to normal users.\n\nThe old stable distribution (woody) does not contain pdns packages.\";\n\n\nif(description)\n{\n script_id(54477);\n script_version(\"$Revision: 6616 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2017-07-07 14:10:49 +0200 (Fri, 07 Jul 2017) $\");\n script_tag(name:\"creation_date\", value:\"2008-01-17 23:00:53 +0100 (Thu, 17 Jan 2008)\");\n script_cve_id(\"CVE-2005-2301\", \"CVE-2005-2302\");\n script_tag(name:\"cvss_base\", value:\"5.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_name(\"Debian Security Advisory DSA 771-1 (pdns)\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2005 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"Debian Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/debian_linux\", \"ssh/login/packages\");\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-deb.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isdpkgvuln(pkg:\"pdns-doc\", ver:\"2.9.17-13sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"pdns\", ver:\"2.9.17-13sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"pdns-backend-geo\", ver:\"2.9.17-13sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"pdns-backend-ldap\", ver:\"2.9.17-13sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"pdns-backend-mysql\", ver:\"2.9.17-13sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"pdns-backend-pgsql\", ver:\"2.9.17-13sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"pdns-backend-pipe\", ver:\"2.9.17-13sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"pdns-backend-sqlite\", ver:\"2.9.17-13sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"pdns-recursor\", ver:\"2.9.17-13sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"pdns-server\", ver:\"2.9.17-13sarge1\", rls:\"DEB3.1\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "pluginID": "54477"}
{"cve": [{"lastseen": "2019-05-29T18:08:14", "bulletinFamily": "NVD", "description": "PowerDNS before 2.9.18, when allowing recursion to a restricted range of IP addresses, does not properly handle questions from clients that are denied recursion, which could cause a \"blank out\" of answers to those clients that are allowed to use recursion.", "modified": "2016-10-18T03:26:00", "id": "CVE-2005-2302", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2005-2302", "published": "2005-07-19T04:00:00", "title": "CVE-2005-2302", "type": "cve", "cvss": {"score": 2.1, "vector": "AV:L/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2019-05-29T18:08:14", "bulletinFamily": "NVD", "description": "PowerDNS before 2.9.18, when running with an LDAP backend, does not properly escape LDAP queries, which allows remote attackers to cause a denial of service (failure to answer ldap questions) and possibly conduct an LDAP injection attack.", "modified": "2016-10-18T03:26:00", "id": "CVE-2005-2301", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2005-2301", "published": "2005-07-19T04:00:00", "title": "CVE-2005-2301", "type": "cve", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}], "nessus": [{"lastseen": "2019-11-01T03:20:05", "bulletinFamily": "scanner", "description": "According to its self-reported version number, the version of the\nPowerDNS service listening on the remote host is prior to 2.9.18. It\nis, therefore, affected by multiple vulnerabilities : \n\n - A flaw exists due to improper escaping of LDAP queries.\n \tA remote attacker can exploit this to cause a denial of\n \tservice condition or to conduct LDAP injection attacks.\n \t(CVE-2005-2301)\n\n - A denial of service vulnerability exists when allowing\n \trecursion to a restricted range of IP addresses due to\n \timproper handling of questions from clients that are\n \tdenied a recursion. An attacker can exploit this to\n \tprevent answers to those clients that are allowed to use\n \trecursion. (CVE-2005-2302)\n\nNote that Nessus has not attempted to exploit these issues but has\ninstead relied only on the application", "modified": "2019-11-02T00:00:00", "id": "POWERDNS_2_9_18.NASL", "href": "https://www.tenable.com/plugins/nessus/87945", "published": "2016-01-15T00:00:00", "title": "PowerDNS < 2.9.18 Multiple Vulnerabilities", "type": "nessus", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(87945);\n script_version(\"1.3\");\n script_cvs_date(\"Date: 2018/07/25 18:58:03\");\n\n script_cve_id(\"CVE-2005-2301\", \"CVE-2005-2302\");\n script_bugtraq_id(14290, 14291);\n\n script_name(english:\"PowerDNS < 2.9.18 Multiple Vulnerabilities\");\n script_summary(english:\"Checks the version of PowerDNS.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote name server is affected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"According to its self-reported version number, the version of the\nPowerDNS service listening on the remote host is prior to 2.9.18. It\nis, therefore, affected by multiple vulnerabilities : \n\n - A flaw exists due to improper escaping of LDAP queries.\n \tA remote attacker can exploit this to cause a denial of\n \tservice condition or to conduct LDAP injection attacks.\n \t(CVE-2005-2301)\n\n - A denial of service vulnerability exists when allowing\n \trecursion to a restricted range of IP addresses due to\n \timproper handling of questions from clients that are\n \tdenied a recursion. An attacker can exploit this to\n \tprevent answers to those clients that are allowed to use\n \trecursion. (CVE-2005-2302)\n\nNote that Nessus has not attempted to exploit these issues but has\ninstead relied only on the application's self-reported version number.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://doc.powerdns.com/md/changelog/#version-2918\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade to PowerDNS version 2.9.18 or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2005/07/16\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2005/07/16\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2016/01/15\");\n\n script_set_attribute(attribute:\"potential_vulnerability\", value:\"true\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:powerdns:powerdns\");\n script_set_attribute(attribute:\"plugin_type\", value:\"remote\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO); \n script_copyright(english:\"This script is Copyright (C) 2016-2018 Tenable Network Security, Inc.\");\n script_family(english:\"DNS\");\n\n script_dependencie(\"pdns_version.nasl\");\n script_require_keys(\"pdns/version\", \"pdns/version_full\", \"pdns/version_source\", \"Settings/ParanoidReport\");\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\n\napp_name = \"PowerDNS\";\nversion_source = get_kb_item_or_exit(\"pdns/version_source\");\nversion_full = get_kb_item_or_exit(\"pdns/version_full\");\nversion = get_kb_item_or_exit(\"pdns/version\");\n\nif (version == UNKNOWN_VER) audit(AUDIT_UNKNOWN_APP_VER, app_name);\nif (report_paranoia < 2) audit(AUDIT_PARANOID);\n\nfix = '2.9.18';\nport = 53;\n\nif (ver_compare(ver:version, fix:fix, strict:FALSE) >= 0)\n audit(AUDIT_LISTEN_NOT_VULN, app_name, port, version_full, \"UDP\");\n\nif (report_verbosity > 0)\n{\n report =\n '\\n Version source : ' + version_source +\n '\\n Installed version : ' + version_full +\n '\\n Fixed version : ' + fix +\n '\\n';\n security_warning(port:port, proto:\"udp\", extra:report);\n}\nelse security_warning(port:port, proto:\"udp\");\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2019-11-01T02:25:50", "bulletinFamily": "scanner", "description": "Several problems have been discovered in pdns, a versatile nameserver\nthat can lead to a denial of service. The Common Vulnerabilities and\nExposures project identifies the following problems :\n\n - CAN-2005-2301\n Norbert Sendetzky and Jan de Groot discovered that the\n LDAP backend did not properly escape all queries,\n allowing it to fail and not answer queries anymore.\n\n - CAN-2005-2302\n\n Wilco Baan discovered that queries from clients without\n recursion permission can temporarily blank out domains\n to clients with recursion permitted. This enables\n outside users to blank out a domain temporarily to\n normal users.", "modified": "2019-11-02T00:00:00", "id": "DEBIAN_DSA-771.NASL", "href": "https://www.tenable.com/plugins/nessus/19336", "published": "2005-08-01T00:00:00", "title": "Debian DSA-771-1 : pdns - several vulnerabilities", "type": "nessus", "sourceData": "#%NASL_MIN_LEVEL 80502\n\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Debian Security Advisory DSA-771. The text \n# itself is copyright (C) Software in the Public Interest, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(19336);\n script_version(\"1.19\");\n script_cvs_date(\"Date: 2019/08/02 13:32:18\");\n\n script_cve_id(\"CVE-2005-2301\", \"CVE-2005-2302\");\n script_xref(name:\"DSA\", value:\"771\");\n\n script_name(english:\"Debian DSA-771-1 : pdns - several vulnerabilities\");\n script_summary(english:\"Checks dpkg output for the updated package\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Debian host is missing a security-related update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Several problems have been discovered in pdns, a versatile nameserver\nthat can lead to a denial of service. The Common Vulnerabilities and\nExposures project identifies the following problems :\n\n - CAN-2005-2301\n Norbert Sendetzky and Jan de Groot discovered that the\n LDAP backend did not properly escape all queries,\n allowing it to fail and not answer queries anymore.\n\n - CAN-2005-2302\n\n Wilco Baan discovered that queries from clients without\n recursion permission can temporarily blank out domains\n to clients with recursion permitted. This enables\n outside users to blank out a domain temporarily to\n normal users.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=318798\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.debian.org/security/2005/dsa-771\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"Upgrade the pdns package.\n\nThe old stable distribution (woody) does not contain pdns packages.\n\nFor the stable distribution (sarge) these problems have been fixed in\nversion 2.9.17-13sarge1.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:pdns\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:debian:debian_linux:3.1\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2005/08/01\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2005/08/01\");\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2005/07/16\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2005-2019 Tenable Network Security, Inc.\");\n script_family(english:\"Debian Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Debian/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"debian_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Debian/release\")) audit(AUDIT_OS_NOT, \"Debian\");\nif (!get_kb_item(\"Host/Debian/dpkg-l\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\nif (deb_check(release:\"3.1\", prefix:\"pdns\", reference:\"2.9.17-13sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"pdns-backend-geo\", reference:\"2.9.17-13sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"pdns-backend-ldap\", reference:\"2.9.17-13sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"pdns-backend-mysql\", reference:\"2.9.17-13sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"pdns-backend-pgsql\", reference:\"2.9.17-13sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"pdns-backend-pipe\", reference:\"2.9.17-13sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"pdns-backend-sqlite\", reference:\"2.9.17-13sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"pdns-doc\", reference:\"2.9.17-13sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"pdns-recursor\", reference:\"2.9.17-13sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"pdns-server\", reference:\"2.9.17-13sarge1\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:deb_report_get());\n else security_warning(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2019-11-01T02:37:32", "bulletinFamily": "scanner", "description": "The LDAP backend in PowerDNS has issues with escaping queries which\ncould cause connection errors. This would make it possible for a\nmalicious user to temporarily blank domains.\n\nThis is known to affect all releases prior to 2.9.18.", "modified": "2019-11-02T00:00:00", "id": "FREEBSD_PKG_43A7B0A7F9BC11D9B47300061BC2AD93.NASL", "href": "https://www.tenable.com/plugins/nessus/19341", "published": "2005-08-01T00:00:00", "title": "FreeBSD : PowerDNS -- LDAP backend fails to escape all queries (43a7b0a7-f9bc-11d9-b473-00061bc2ad93)", "type": "nessus", "sourceData": "#%NASL_MIN_LEVEL 80502\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from the FreeBSD VuXML database :\n#\n# Copyright 2003-2018 Jacques Vidrine and contributors\n#\n# Redistribution and use in source (VuXML) and 'compiled' forms (SGML,\n# HTML, PDF, PostScript, RTF and so forth) with or without modification,\n# are permitted provided that the following conditions are met:\n# 1. Redistributions of source code (VuXML) must retain the above\n# copyright notice, this list of conditions and the following\n# disclaimer as the first lines of this file unmodified.\n# 2. Redistributions in compiled form (transformed to other DTDs,\n# published online in any format, converted to PDF, PostScript,\n# RTF and other formats) must reproduce the above copyright\n# notice, this list of conditions and the following disclaimer\n# in the documentation and/or other materials provided with the\n# distribution.\n# \n# THIS DOCUMENTATION IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS \"AS IS\"\n# AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,\n# THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR\n# PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS\n# BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY,\n# OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT\n# OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR\n# BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,\n# WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE\n# OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS DOCUMENTATION,\n# EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(19341);\n script_version(\"1.17\");\n script_cvs_date(\"Date: 2019/08/02 13:32:37\");\n\n script_cve_id(\"CVE-2005-2302\");\n\n script_name(english:\"FreeBSD : PowerDNS -- LDAP backend fails to escape all queries (43a7b0a7-f9bc-11d9-b473-00061bc2ad93)\");\n script_summary(english:\"Checks for updated package in pkg_info output\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote FreeBSD host is missing a security-related update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"The LDAP backend in PowerDNS has issues with escaping queries which\ncould cause connection errors. This would make it possible for a\nmalicious user to temporarily blank domains.\n\nThis is known to affect all releases prior to 2.9.18.\"\n );\n # http://doc.powerdns.com/security-policy.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://doc.powerdns.com/md/security/\"\n );\n # http://marc.theaimsgroup.com/?l=bugtraq&m=112155941310297&w=2\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://marc.info/?l=bugtraq&m=112155941310297&w=2\"\n );\n # https://vuxml.freebsd.org/freebsd/43a7b0a7-f9bc-11d9-b473-00061bc2ad93.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?bb50bfd6\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected package.\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:N/I:N/A:P\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:powerdns\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:freebsd:freebsd\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2005/07/16\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2005/07/21\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2005/08/01\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2005-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"FreeBSD Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/FreeBSD/release\", \"Host/FreeBSD/pkg_info\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"freebsd_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/FreeBSD/release\")) audit(AUDIT_OS_NOT, \"FreeBSD\");\nif (!get_kb_item(\"Host/FreeBSD/pkg_info\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\n\nif (pkg_test(save_report:TRUE, pkg:\"powerdns<2.9.18\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_note(port:0, extra:pkg_report_get());\n else security_note(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 2.1, "vector": "AV:L/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2019-11-01T02:25:50", "bulletinFamily": "scanner", "description": "This advisory adds security support for the stable amd64 distribution.\nIt covers all security updates since the release of sarge, which were\nmissing updated packages for the not yet official amd64 port. Future\nsecurity advisories will include updates for this port as well.", "modified": "2019-11-02T00:00:00", "id": "DEBIAN_DSA-773.NASL", "href": "https://www.tenable.com/plugins/nessus/57528", "published": "2012-01-12T00:00:00", "title": "Debian DSA-773-1 : amd64 - several vulnerabilities", "type": "nessus", "sourceData": "#%NASL_MIN_LEVEL 80502\n\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Debian Security Advisory DSA-773. The text \n# itself is copyright (C) Software in the Public Interest, Inc.\n#\n\nif (NASL_LEVEL < 3000) exit(0);\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(57528);\n script_version(\"1.6\");\n script_cvs_date(\"Date: 2019/08/02 13:32:18\");\n\n script_cve_id(\"CVE-2005-0392\", \"CVE-2005-0393\", \"CVE-2005-0469\", \"CVE-2005-0753\", \"CVE-2005-1151\", \"CVE-2005-1152\", \"CVE-2005-1174\", \"CVE-2005-1175\", \"CVE-2005-1266\", \"CVE-2005-1269\", \"CVE-2005-1545\", \"CVE-2005-1546\", \"CVE-2005-1686\", \"CVE-2005-1689\", \"CVE-2005-1796\", \"CVE-2005-1848\", \"CVE-2005-1849\", \"CVE-2005-1850\", \"CVE-2005-1851\", \"CVE-2005-1852\", \"CVE-2005-1853\", \"CVE-2005-1858\", \"CVE-2005-1914\", \"CVE-2005-1916\", \"CVE-2005-1922\", \"CVE-2005-1923\", \"CVE-2005-1934\", \"CVE-2005-1992\", \"CVE-2005-1993\", \"CVE-2005-2024\", \"CVE-2005-2040\", \"CVE-2005-2056\", \"CVE-2005-2070\", \"CVE-2005-2096\", \"CVE-2005-2231\", \"CVE-2005-2250\", \"CVE-2005-2277\", \"CVE-2005-2301\", \"CVE-2005-2302\", \"CVE-2005-2370\");\n script_xref(name:\"DSA\", value:\"773\");\n\n script_name(english:\"Debian DSA-773-1 : amd64 - several vulnerabilities\");\n script_summary(english:\"Checks dpkg output for the updated package\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Debian host is missing a security-related update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"This advisory adds security support for the stable amd64 distribution.\nIt covers all security updates since the release of sarge, which were\nmissing updated packages for the not yet official amd64 port. Future\nsecurity advisories will include updates for this port as well.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.debian.org/security/2005/dsa-773\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Upgrade the affected several package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_cwe_id(119);\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:several\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:debian:debian_linux:3.1\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2005/08/11\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2012/01/12\");\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2005/03/28\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2012-2019 Tenable Network Security, Inc.\");\n script_family(english:\"Debian Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Debian/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"debian_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Debian/release\")) audit(AUDIT_OS_NOT, \"Debian\");\nif (!get_kb_item(\"Host/Debian/dpkg-l\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\nif (deb_check(release:\"3.1\", prefix:\"affix\", reference:\"2.1.1-2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"centericq\", reference:\"4.20.0-1sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"centericq-common\", reference:\"4.20.0-1sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"centericq-fribidi\", reference:\"4.20.0-1sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"centericq-utf8\", reference:\"4.20.0-1sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"clamav\", reference:\"0.84-2.sarge.1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"clamav-daemon\", reference:\"0.84-2.sarge.1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"clamav-freshclam\", reference:\"0.84-2.sarge.1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"clamav-milter\", reference:\"0.84-2.sarge.1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"crip\", reference:\"3.5-1sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"cvs\", reference:\"1.11.1p1debian-11\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"dhcpcd\", reference:\"1.3.22pl4-21sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"ekg\", reference:\"1.5+20050411-5\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"ettercap\", reference:\"0.7.1-1sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"ettercap-common\", reference:\"0.7.1-1sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"ettercap-gtk\", reference:\"0.7.1-1sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"fuse-utils\", reference:\"2.2.1-4sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"gaim\", reference:\"1.2.1-1.4\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"gaim-dev\", reference:\"1.2.1-1.4\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"gedit\", reference:\"2.8.3-4sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"gopher\", reference:\"3.0.7sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"heartbeat\", reference:\"1.2.3-9sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"heartbeat-dev\", reference:\"1.2.3-9sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"heimdal-clients\", reference:\"0.6.3-10sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"heimdal-clients-x\", reference:\"0.6.3-10sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"heimdal-dev\", reference:\"0.6.3-10sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"heimdal-kdc\", reference:\"0.6.3-10sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"heimdal-servers\", reference:\"0.6.3-10sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"heimdal-servers-x\", reference:\"0.6.3-10sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"ht\", reference:\"0.8.0-2sarge4\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"krb5-admin-server\", reference:\"1.3.6-2sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"krb5-clients\", reference:\"1.3.6-2sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"krb5-ftpd\", reference:\"1.3.6-2sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"krb5-kdc\", reference:\"1.3.6-2sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"krb5-rsh-server\", reference:\"1.3.6-2sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"krb5-telnetd\", reference:\"1.3.6-2sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"krb5-user\", reference:\"1.3.6-2sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"libaffix-dev\", reference:\"2.1.1-2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"libaffix2\", reference:\"2.1.1-2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"libasn1-6-heimdal\", reference:\"0.6.3-10sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"libclamav-dev\", reference:\"0.84-2.sarge.1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"libclamav1\", reference:\"0.84-2.sarge.1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"libdbm-ruby1.8\", reference:\"1.8.2-7sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"libfuse-dev\", reference:\"2.2.1-4sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"libfuse2\", reference:\"2.2.1-4sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"libgadu-dev\", reference:\"1.5+20050411-5\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"libgadu3\", reference:\"1.5+20050411-5\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"libgdbm-ruby1.8\", reference:\"1.8.2-7sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"libgssapi1-heimdal\", reference:\"0.6.3-10sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"libhdb7-heimdal\", reference:\"0.6.3-10sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"libkadm55\", reference:\"1.3.6-2sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"libkadm5clnt4-heimdal\", reference:\"0.6.3-10sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"libkadm5srv7-heimdal\", reference:\"0.6.3-10sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"libkafs0-heimdal\", reference:\"0.6.3-10sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"libkrb5-17-heimdal\", reference:\"0.6.3-10sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"libkrb5-dev\", reference:\"1.3.6-2sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"libkrb53\", reference:\"1.3.6-2sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"libopenssl-ruby1.8\", reference:\"1.8.2-7sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"libpils-dev\", reference:\"1.2.3-9sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"libpils0\", reference:\"1.2.3-9sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"libreadline-ruby1.8\", reference:\"1.8.2-7sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"libruby1.8\", reference:\"1.8.2-7sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"libruby1.8-dbg\", reference:\"1.8.2-7sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"libstonith-dev\", reference:\"1.2.3-9sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"libstonith0\", reference:\"1.2.3-9sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"libtcltk-ruby1.8\", reference:\"1.8.2-7sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"pdns\", reference:\"2.9.17-13sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"pdns-backend-geo\", reference:\"2.9.17-13sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"pdns-backend-ldap\", reference:\"2.9.17-13sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"pdns-backend-mysql\", reference:\"2.9.17-13sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"pdns-backend-pgsql\", reference:\"2.9.17-13sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"pdns-backend-pipe\", reference:\"2.9.17-13sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"pdns-backend-sqlite\", reference:\"2.9.17-13sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"pdns-recursor\", reference:\"2.9.17-13sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"pdns-server\", reference:\"2.9.17-13sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"ppxp\", reference:\"0.2001080415-10sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"ppxp-dev\", reference:\"0.2001080415-10sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"ppxp-tcltk\", reference:\"0.2001080415-10sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"ppxp-x11\", reference:\"0.2001080415-10sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"qpopper\", reference:\"4.0.5-4sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"qpopper-drac\", reference:\"4.0.5-4sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"razor\", reference:\"2.670-1sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"ruby1.8\", reference:\"1.8.2-7sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"ruby1.8-dev\", reference:\"1.8.2-7sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"spamc\", reference:\"3.0.3-2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"stonith\", reference:\"1.2.3-9sarge2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"sudo\", reference:\"1.6.8p7-1.1sarge1\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"zlib-bin\", reference:\"1.2.2-4.sarge.2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"zlib1g\", reference:\"1.2.2-4.sarge.2\")) flag++;\nif (deb_check(release:\"3.1\", prefix:\"zlib1g-dev\", reference:\"1.2.2-4.sarge.2\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:deb_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}], "debian": [{"lastseen": "2019-05-30T02:22:29", "bulletinFamily": "unix", "description": "- --------------------------------------------------------------------------\nDebian Security Advisory DSA 771-1 security@debian.org\nhttp://www.debian.org/security/ Martin Schulze\nAugust 1st, 2005 http://www.debian.org/security/faq\n- --------------------------------------------------------------------------\n\nPackage : pdns\nVulnerability : several\nProblem-Type : remote\nDebian-specific: no\nCVE ID : CAN-2005-2301 CAN-2005-2302\nDebian Bug : 318798\n\nSeveral problems have been discovered in pdns, a versatile nameserver\nthat can lead to a denial of service. The Common Vulnerabilities and\nExposures project identifies the following problems:\n\nCAN-2005-2301\n\n Norbert Sendetzky and Jan de Groot discoverd that the LDAP backend\n did not properly escape all queries, allowing it to fail and not\n answer queries anymore.\n\nCAN-2005-2302\n\n Wilco Baan discovered that queries from clients without recursion\n permission can temporarily blank out domains to clients with\n recursion permitted. This enables outside users to blank out a\n domain temporarily to normal users.\n\nThe old stable distribution (woody) does not contain pdns packages.\n\nFor the stable distribution (sarge) these problems have been fixed in\nversion 2.9.17-13sarge1.\n\nFor the unstable distribution (sid) these problems have been fixed in\nversion 2.9.18-1.\n\nWe recommend that you upgrade your pdns package.\n\n\nUpgrade Instructions\n- --------------------\n\nwget url\n will fetch the file for you\ndpkg -i file.deb\n will install the referenced file.\n\nIf you are using the apt-get package manager, use the line for\nsources.list as given below:\n\napt-get update\n will update the internal database\napt-get upgrade\n will install corrected packages\n\nYou may use an automated update by adding the resources from the\nfooter to the proper configuration.\n\n\nDebian GNU/Linux 3.1 alias sarge\n- --------------------------------\n\n Source archives:\n\n http://security.debian.org/pool/updates/main/p/pdns/pdns_2.9.17-13sarge1.dsc\n Size/MD5 checksum: 1018 0853a39aeb6b4d6c9ba001f364d842bc\n http://security.debian.org/pool/updates/main/p/pdns/pdns_2.9.17-13sarge1.diff.gz\n Size/MD5 checksum: 29798 4c0437b86c5e3ccbffa6838012dbaf74\n http://security.debian.org/pool/updates/main/p/pdns/pdns_2.9.17.orig.tar.gz\n Size/MD5 checksum: 782592 92489391182dc40012f1de7b2005ea93\n\n Architecture independent components:\n\n http://security.debian.org/pool/updates/main/p/pdns/pdns-doc_2.9.17-13sarge1_all.deb\n Size/MD5 checksum: 134202 bedb1d7a9eece3f76de635c23b4535d7\n\n Alpha architecture:\n\n http://security.debian.org/pool/updates/main/p/pdns/pdns_2.9.17-13sarge1_alpha.deb\n Size/MD5 checksum: 16016 621dbb1ae4cdf8dda2396f4013608042\n http://security.debian.org/pool/updates/main/p/pdns/pdns-backend-geo_2.9.17-13sarge1_alpha.deb\n Size/MD5 checksum: 128188 f2d21705577ea2a5fd1aeead8126e991\n http://security.debian.org/pool/updates/main/p/pdns/pdns-backend-ldap_2.9.17-13sarge1_alpha.deb\n Size/MD5 checksum: 235340 40264b77c8d36138bda47468867d7aee\n http://security.debian.org/pool/updates/main/p/pdns/pdns-backend-mysql_2.9.17-13sarge1_alpha.deb\n Size/MD5 checksum: 110132 46d2d68a646b4a2235de180a32f54e8e\n http://security.debian.org/pool/updates/main/p/pdns/pdns-backend-pgsql_2.9.17-13sarge1_alpha.deb\n Size/MD5 checksum: 70406 1156c4fe6d5df7b67f918b2c6aa8c328\n http://security.debian.org/pool/updates/main/p/pdns/pdns-backend-pipe_2.9.17-13sarge1_alpha.deb\n Size/MD5 checksum: 81188 0c222e749e764b497dcc84f57e286475\n http://security.debian.org/pool/updates/main/p/pdns/pdns-backend-sqlite_2.9.17-13sarge1_alpha.deb\n Size/MD5 checksum: 63782 e598603835286d3347bfa27ac51c7031\n http://security.debian.org/pool/updates/main/p/pdns/pdns-recursor_2.9.17-13sarge1_alpha.deb\n Size/MD5 checksum: 199978 5eecc516f56b5cdcaa73e79c02daedc6\n http://security.debian.org/pool/updates/main/p/pdns/pdns-server_2.9.17-13sarge1_alpha.deb\n Size/MD5 checksum: 687108 ae808192faab151eb045c8e25f8c8683\n\n ARM architecture:\n\n http://security.debian.org/pool/updates/main/p/pdns/pdns_2.9.17-13sarge1_arm.deb\n Size/MD5 checksum: 16026 939a3fb962ca170f622af16a82cf3549\n http://security.debian.org/pool/updates/main/p/pdns/pdns-backend-geo_2.9.17-13sarge1_arm.deb\n Size/MD5 checksum: 153700 3d678c9dd2d26015a8891fe1246cb85e\n http://security.debian.org/pool/updates/main/p/pdns/pdns-backend-ldap_2.9.17-13sarge1_arm.deb\n Size/MD5 checksum: 318412 b249e42dac179db588c65cf20f2583a2\n http://security.debian.org/pool/updates/main/p/pdns/pdns-backend-mysql_2.9.17-13sarge1_arm.deb\n Size/MD5 checksum: 148498 5e6d21db1505f5477ee5acf1bc0486bf\n http://security.debian.org/pool/updates/main/p/pdns/pdns-backend-pgsql_2.9.17-13sarge1_arm.deb\n Size/MD5 checksum: 95668 0cfd34b907b705428c60cd9871492e2d\n http://security.debian.org/pool/updates/main/p/pdns/pdns-backend-pipe_2.9.17-13sarge1_arm.deb\n Size/MD5 checksum: 104304 dccbfd9c8c82e8b2a68aa1a916473dff\n http://security.debian.org/pool/updates/main/p/pdns/pdns-backend-sqlite_2.9.17-13sarge1_arm.deb\n Size/MD5 checksum: 85552 1f6f5a3cf8724b17b75169d93b05980c\n http://security.debian.org/pool/updates/main/p/pdns/pdns-recursor_2.9.17-13sarge1_arm.deb\n Size/MD5 checksum: 271888 f177cc208f286a322b2db376d6c3e192\n http://security.debian.org/pool/updates/main/p/pdns/pdns-server_2.9.17-13sarge1_arm.deb\n Size/MD5 checksum: 982256 9012824597e4bf2d90e838da4fda69bc\n\n Intel IA-32 architecture:\n\n http://security.debian.org/pool/updates/main/p/pdns/pdns_2.9.17-13sarge1_i386.deb\n Size/MD5 checksum: 16608 357a0624bcb110d7ce02f9a0b7bee292\n http://security.debian.org/pool/updates/main/p/pdns/pdns-backend-geo_2.9.17-13sarge1_i386.deb\n Size/MD5 checksum: 105884 7ed515d665879bfde98865dc9e0b5e8c\n http://security.debian.org/pool/updates/main/p/pdns/pdns-backend-ldap_2.9.17-13sarge1_i386.deb\n Size/MD5 checksum: 190228 bb6937448e929f7a4cf2f7a7d186b0f3\n http://security.debian.org/pool/updates/main/p/pdns/pdns-backend-mysql_2.9.17-13sarge1_i386.deb\n Size/MD5 checksum: 85610 ef863523590f6cbdbcb261031afedbb4\n http://security.debian.org/pool/updates/main/p/pdns/pdns-backend-pgsql_2.9.17-13sarge1_i386.deb\n Size/MD5 checksum: 56046 a4e44140e9864c592f90570e75020c23\n http://security.debian.org/pool/updates/main/p/pdns/pdns-backend-pipe_2.9.17-13sarge1_i386.deb\n Size/MD5 checksum: 64598 d6360752c244fa6e454a1f46680888bc\n http://security.debian.org/pool/updates/main/p/pdns/pdns-backend-sqlite_2.9.17-13sarge1_i386.deb\n Size/MD5 checksum: 51370 13a2d22faf21717300407bdedb204309\n http://security.debian.org/pool/updates/main/p/pdns/pdns-recursor_2.9.17-13sarge1_i386.deb\n Size/MD5 checksum: 165408 4ced59cd5fb6f8b7cbe7347ec86f7839\n http://security.debian.org/pool/updates/main/p/pdns/pdns-server_2.9.17-13sarge1_i386.deb\n Size/MD5 checksum: 572496 c58056c3059d5f71687dfd5b9bfa6585\n\n Intel IA-64 architecture:\n\n http://security.debian.org/pool/updates/main/p/pdns/pdns_2.9.17-13sarge1_ia64.deb\n Size/MD5 checksum: 16012 6f54caec9aa5da3883283c3aac18d5dc\n http://security.debian.org/pool/updates/main/p/pdns/pdns-backend-geo_2.9.17-13sarge1_ia64.deb\n Size/MD5 checksum: 135824 4c8ddd124dbb8011c978375796b08630\n http://security.debian.org/pool/updates/main/p/pdns/pdns-backend-ldap_2.9.17-13sarge1_ia64.deb\n Size/MD5 checksum: 262958 8b9bfd9108a6a7ca212a77dc16b7d7c1\n http://security.debian.org/pool/updates/main/p/pdns/pdns-backend-mysql_2.9.17-13sarge1_ia64.deb\n Size/MD5 checksum: 112768 fed34d607080d8b97068eff67c35f42a\n http://security.debian.org/pool/updates/main/p/pdns/pdns-backend-pgsql_2.9.17-13sarge1_ia64.deb\n Size/MD5 checksum: 68840 9a4b231eb4307dcf52a76123280d3230\n http://security.debian.org/pool/updates/main/p/pdns/pdns-backend-pipe_2.9.17-13sarge1_ia64.deb\n Size/MD5 checksum: 83782 2e4782611a25ed6d329ecb6f5cfbecaa\n http://security.debian.org/pool/updates/main/p/pdns/pdns-backend-sqlite_2.9.17-13sarge1_ia64.deb\n Size/MD5 checksum: 63762 26745c938da7163790335e6fe07d7e1e\n http://security.debian.org/pool/updates/main/p/pdns/pdns-recursor_2.9.17-13sarge1_ia64.deb\n Size/MD5 checksum: 229174 b1dfbb1c8691da8c0b53952343ed147e\n http://security.debian.org/pool/updates/main/p/pdns/pdns-server_2.9.17-13sarge1_ia64.deb\n Size/MD5 checksum: 814878 82d3e7c0feca9e74ebcc57820d35b4d4\n\n HP Precision architecture:\n\n http://security.debian.org/pool/updates/main/p/pdns/pdns_2.9.17-13sarge1_hppa.deb\n Size/MD5 checksum: 16016 7d53ffe4047bf55a3c3a979699b04d2e\n http://security.debian.org/pool/updates/main/p/pdns/pdns-backend-geo_2.9.17-13sarge1_hppa.deb\n Size/MD5 checksum: 131040 dbf129fd9439d0cbddf1bbce2a194ca6\n http://security.debian.org/pool/updates/main/p/pdns/pdns-backend-ldap_2.9.17-13sarge1_hppa.deb\n Size/MD5 checksum: 247142 e79e4636aee39e85a2246a2d9f987df5\n http://security.debian.org/pool/updates/main/p/pdns/pdns-backend-mysql_2.9.17-13sarge1_hppa.deb\n Size/MD5 checksum: 114520 56e3cbcd8b2eca5bf30c1963570fbcf6\n http://security.debian.org/pool/updates/main/p/pdns/pdns-backend-pgsql_2.9.17-13sarge1_hppa.deb\n Size/MD5 checksum: 72792 cd3e30c2a7ce276db0d52ba394f57ed7\n http://security.debian.org/pool/updates/main/p/pdns/pdns-backend-pipe_2.9.17-13sarge1_hppa.deb\n Size/MD5 checksum: 83954 6f59cc44bc5561769480f56919244b30\n http://security.debian.org/pool/updates/main/p/pdns/pdns-backend-sqlite_2.9.17-13sarge1_hppa.deb\n Size/MD5 checksum: 66750 8fed2e2aa498d1be0e45878b5456a9fa\n http://security.debian.org/pool/updates/main/p/pdns/pdns-recursor_2.9.17-13sarge1_hppa.deb\n Size/MD5 checksum: 219890 c5ea8b0c7ce3480478711ef1852cc566\n http://security.debian.org/pool/updates/main/p/pdns/pdns-server_2.9.17-13sarge1_hppa.deb\n Size/MD5 checksum: 727006 d166c1b0b5e9b0989c5bb8419c377a53\n\n Motorola 680x0 architecture:\n\n http://security.debian.org/pool/updates/main/p/pdns/pdns_2.9.17-13sarge1_m68k.deb\n Size/MD5 checksum: 16026 b08feaf530b3e51fb031b9a171075e4e\n http://security.debian.org/pool/updates/main/p/pdns/pdns-backend-geo_2.9.17-13sarge1_m68k.deb\n Size/MD5 checksum: 108388 8e6d08a9371a64926d7c4beef5205945\n http://security.debian.org/pool/updates/main/p/pdns/pdns-backend-ldap_2.9.17-13sarge1_m68k.deb\n Size/MD5 checksum: 197570 69d053f36af9cd8f73dbc5470fa11d6f\n http://security.debian.org/pool/updates/main/p/pdns/pdns-backend-mysql_2.9.17-13sarge1_m68k.deb\n Size/MD5 checksum: 89250 02d1761d0141aded8587ddf3836879e2\n http://security.debian.org/pool/updates/main/p/pdns/pdns-backend-pgsql_2.9.17-13sarge1_m68k.deb\n Size/MD5 checksum: 59904 fc5d48ee6757b37eb55d8a03e03b6c90\n http://security.debian.org/pool/updates/main/p/pdns/pdns-backend-pipe_2.9.17-13sarge1_m68k.deb\n Size/MD5 checksum: 67632 2aa2247dbccc281d60203d00089a4e4e\n http://security.debian.org/pool/updates/main/p/pdns/pdns-backend-sqlite_2.9.17-13sarge1_m68k.deb\n Size/MD5 checksum: 55090 6135caa3beba19a3b6cc42cde66e1889\n http://security.debian.org/pool/updates/main/p/pdns/pdns-recursor_2.9.17-13sarge1_m68k.deb\n Size/MD5 checksum: 167762 a01a400e8d778e7c3614d628ab912e3f\n http://security.debian.org/pool/updates/main/p/pdns/pdns-server_2.9.17-13sarge1_m68k.deb\n Size/MD5 checksum: 589634 03814d127f5a1d25ce328cb5cd5f1f60\n\n Big endian MIPS architecture:\n\n http://security.debian.org/pool/updates/main/p/pdns/pdns_2.9.17-13sarge1_mips.deb\n Size/MD5 checksum: 16016 cd36ca9a0fa9f5a9aaa75897f3c7418c\n http://security.debian.org/pool/updates/main/p/pdns/pdns-backend-geo_2.9.17-13sarge1_mips.deb\n Size/MD5 checksum: 109798 57cb7be975fa3ea2c27ff815d7f0ba3e\n http://security.debian.org/pool/updates/main/p/pdns/pdns-backend-ldap_2.9.17-13sarge1_mips.deb\n Size/MD5 checksum: 200772 89af7d035f7f9d871e95dd5e4b25bd56\n http://security.debian.org/pool/updates/main/p/pdns/pdns-backend-mysql_2.9.17-13sarge1_mips.deb\n Size/MD5 checksum: 90842 f3ce3096928b9b6bdcec20d43ea32515\n http://security.debian.org/pool/updates/main/p/pdns/pdns-backend-pgsql_2.9.17-13sarge1_mips.deb\n Size/MD5 checksum: 59148 98bed909b4b5749ab1930a31f713aeb2\n http://security.debian.org/pool/updates/main/p/pdns/pdns-backend-pipe_2.9.17-13sarge1_mips.deb\n Size/MD5 checksum: 67990 ea7e179119e0fea1d700e9f079693ca5\n http://security.debian.org/pool/updates/main/p/pdns/pdns-backend-sqlite_2.9.17-13sarge1_mips.deb\n Size/MD5 checksum: 54776 8d380a8440387394165eccee67c762c4\n http://security.debian.org/pool/updates/main/p/pdns/pdns-recursor_2.9.17-13sarge1_mips.deb\n Size/MD5 checksum: 182952 a252292345ae2f8a547d216d37cbe035\n http://security.debian.org/pool/updates/main/p/pdns/pdns-server_2.9.17-13sarge1_mips.deb\n Size/MD5 checksum: 591376 53c9316ba8c4f82f3a93a5b9d5a5f012\n\n Little endian MIPS architecture:\n\n http://security.debian.org/pool/updates/main/p/pdns/pdns_2.9.17-13sarge1_mipsel.deb\n Size/MD5 checksum: 16016 ce2a3df355d3d874115cbf67aca0cade\n http://security.debian.org/pool/updates/main/p/pdns/pdns-backend-geo_2.9.17-13sarge1_mipsel.deb\n Size/MD5 checksum: 109546 b3dd10a3d05006200770637f24a9103f\n http://security.debian.org/pool/updates/main/p/pdns/pdns-backend-ldap_2.9.17-13sarge1_mipsel.deb\n Size/MD5 checksum: 200526 a24f85cca08523fb180de3ae9c5090eb\n http://security.debian.org/pool/updates/main/p/pdns/pdns-backend-mysql_2.9.17-13sarge1_mipsel.deb\n Size/MD5 checksum: 90654 0bc9f1a71761d74f73cc93e054884215\n http://security.debian.org/pool/updates/main/p/pdns/pdns-backend-pgsql_2.9.17-13sarge1_mipsel.deb\n Size/MD5 checksum: 59120 9927d4a872906890a43791f2fe2579ee\n http://security.debian.org/pool/updates/main/p/pdns/pdns-backend-pipe_2.9.17-13sarge1_mipsel.deb\n Size/MD5 checksum: 67968 c1d289a27a3c1229533408dff970bb23\n http://security.debian.org/pool/updates/main/p/pdns/pdns-backend-sqlite_2.9.17-13sarge1_mipsel.deb\n Size/MD5 checksum: 54760 2e63ef2b9484054bb24d194f55d286e6\n http://security.debian.org/pool/updates/main/p/pdns/pdns-recursor_2.9.17-13sarge1_mipsel.deb\n Size/MD5 checksum: 182464 a67792eee411ce6d55496303a776b3b4\n http://security.debian.org/pool/updates/main/p/pdns/pdns-server_2.9.17-13sarge1_mipsel.deb\n Size/MD5 checksum: 590744 ca79710d887fa76a78c19e248f4a2ee5\n\n PowerPC architecture:\n\n http://security.debian.org/pool/updates/main/p/pdns/pdns_2.9.17-13sarge1_powerpc.deb\n Size/MD5 checksum: 16012 e60ef7db0805bdaec95fe51c765157e1\n http://security.debian.org/pool/updates/main/p/pdns/pdns-backend-geo_2.9.17-13sarge1_powerpc.deb\n Size/MD5 checksum: 109692 21c091ec248ddd2e68be23e069afeb9e\n http://security.debian.org/pool/updates/main/p/pdns/pdns-backend-ldap_2.9.17-13sarge1_powerpc.deb\n Size/MD5 checksum: 196256 f22de6b994c3b04218b99ec04d6f2e89\n http://security.debian.org/pool/updates/main/p/pdns/pdns-backend-mysql_2.9.17-13sarge1_powerpc.deb\n Size/MD5 checksum: 91038 ab830c1ace1ed862494368627568ca7c\n http://security.debian.org/pool/updates/main/p/pdns/pdns-backend-pgsql_2.9.17-13sarge1_powerpc.deb\n Size/MD5 checksum: 60334 bb3342c972d9b945e6330e998c12a48d\n http://security.debian.org/pool/updates/main/p/pdns/pdns-backend-pipe_2.9.17-13sarge1_powerpc.deb\n Size/MD5 checksum: 67878 56449e1a43d7dc0fbb6922505d1a77ff\n http://security.debian.org/pool/updates/main/p/pdns/pdns-backend-sqlite_2.9.17-13sarge1_powerpc.deb\n Size/MD5 checksum: 55134 5bba23ac17e17a39d60dd9dd0f98086c\n http://security.debian.org/pool/updates/main/p/pdns/pdns-recursor_2.9.17-13sarge1_powerpc.deb\n Size/MD5 checksum: 172386 8d62ffd1fad186ddba17d6ddbe4185a9\n http://security.debian.org/pool/updates/main/p/pdns/pdns-server_2.9.17-13sarge1_powerpc.deb\n Size/MD5 checksum: 592356 40c0d9e06176c89d8f321514e80c60bc\n\n IBM S/390 architecture:\n\n http://security.debian.org/pool/updates/main/p/pdns/pdns_2.9.17-13sarge1_s390.deb\n Size/MD5 checksum: 16016 3f336948d846b74a65e6caf93312f4d3\n http://security.debian.org/pool/updates/main/p/pdns/pdns-backend-geo_2.9.17-13sarge1_s390.deb\n Size/MD5 checksum: 104590 db7bdcbdee19d89335ed526ffb48ba05\n http://security.debian.org/pool/updates/main/p/pdns/pdns-backend-ldap_2.9.17-13sarge1_s390.deb\n Size/MD5 checksum: 177148 6fbe6c2d37ab31a8d67b1f096b86820e\n http://security.debian.org/pool/updates/main/p/pdns/pdns-backend-mysql_2.9.17-13sarge1_s390.deb\n Size/MD5 checksum: 82344 aef7e67405dee3c5d274903f6eae0aae\n http://security.debian.org/pool/updates/main/p/pdns/pdns-backend-pgsql_2.9.17-13sarge1_s390.deb\n Size/MD5 checksum: 54012 8ff5a6d7690300d795c3b3e65e1fb91d\n http://security.debian.org/pool/updates/main/p/pdns/pdns-backend-pipe_2.9.17-13sarge1_s390.deb\n Size/MD5 checksum: 63390 512cced91f0a35de3b2abf993987e8f6\n http://security.debian.org/pool/updates/main/p/pdns/pdns-backend-sqlite_2.9.17-13sarge1_s390.deb\n Size/MD5 checksum: 49582 84980b91ee2c06ea4074bc14d6ea46d1\n http://security.debian.org/pool/updates/main/p/pdns/pdns-recursor_2.9.17-13sarge1_s390.deb\n Size/MD5 checksum: 152376 6910874c9685b5eb0edec47adfb36dd3\n http://security.debian.org/pool/updates/main/p/pdns/pdns-server_2.9.17-13sarge1_s390.deb\n Size/MD5 checksum: 518220 e588a8de7cd44851d96ecf2643b8cc37\n\n Sun Sparc architecture:\n\n http://security.debian.org/pool/updates/main/p/pdns/pdns_2.9.17-13sarge1_sparc.deb\n Size/MD5 checksum: 16012 3b5eb251bd613cc3bb5bacd9712bf311\n http://security.debian.org/pool/updates/main/p/pdns/pdns-backend-geo_2.9.17-13sarge1_sparc.deb\n Size/MD5 checksum: 107216 582fa89a2dce75cd3d83c5c0a2f3d6ab\n http://security.debian.org/pool/updates/main/p/pdns/pdns-backend-ldap_2.9.17-13sarge1_sparc.deb\n Size/MD5 checksum: 189996 16a3e141b002694be72130b7a94adbe9\n http://security.debian.org/pool/updates/main/p/pdns/pdns-backend-mysql_2.9.17-13sarge1_sparc.deb\n Size/MD5 checksum: 88710 5ac67170e1e2c55ed2b8c79ed222f7fc\n http://security.debian.org/pool/updates/main/p/pdns/pdns-backend-pgsql_2.9.17-13sarge1_sparc.deb\n Size/MD5 checksum: 58438 224e96ca4e6a81321cc10c496d17cc55\n http://security.debian.org/pool/updates/main/p/pdns/pdns-backend-pipe_2.9.17-13sarge1_sparc.deb\n Size/MD5 checksum: 66122 fee851568972ae11df770fdd93d9d39b\n http://security.debian.org/pool/updates/main/p/pdns/pdns-backend-sqlite_2.9.17-13sarge1_sparc.deb\n Size/MD5 checksum: 53316 8dd03fcedd9c49b7fe6ca4b135e67a70\n http://security.debian.org/pool/updates/main/p/pdns/pdns-recursor_2.9.17-13sarge1_sparc.deb\n Size/MD5 checksum: 165450 cf2b7d9b8d7f3a2ac796544eadc6be98\n http://security.debian.org/pool/updates/main/p/pdns/pdns-server_2.9.17-13sarge1_sparc.deb\n Size/MD5 checksum: 578782 cc27d78b7a21e27de95dcd1da5656ed0\n\n\n These files will probably be moved into the stable distribution on\n its next update.\n\n- ---------------------------------------------------------------------------------\nFor apt-get: deb http://security.debian.org/ stable/updates main\nFor dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main\nMailing list: debian-security-announce@lists.debian.org\nPackage info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>\n\n", "modified": "2005-08-01T00:00:00", "published": "2005-08-01T00:00:00", "id": "DEBIAN:DSA-771-1:E137F", "href": "https://lists.debian.org/debian-security-announce/debian-security-announce-2005/msg00158.html", "title": "[SECURITY] [DSA 771-1] New pdns packages fix denial of service", "type": "debian", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}], "freebsd": [{"lastseen": "2019-05-29T18:34:54", "bulletinFamily": "unix", "description": "\nThe LDAP backend in PowerDNS has issues with escaping\n\t queries which could cause connection errors.\tThis would\n\t make it possible for a malicious user to temporarily blank\n\t domains.\n\nThis is known to affect all releases prior to 2.9.18.\n\n", "modified": "2005-07-16T00:00:00", "published": "2005-07-16T00:00:00", "id": "43A7B0A7-F9BC-11D9-B473-00061BC2AD93", "href": "https://vuxml.freebsd.org/freebsd/43a7b0a7-f9bc-11d9-b473-00061bc2ad93.html", "title": "PowerDNS -- LDAP backend fails to escape all queries", "type": "freebsd", "cvss": {"score": 2.1, "vector": "AV:L/AC:L/Au:N/C:N/I:N/A:P"}}], "osvdb": [{"lastseen": "2017-04-28T13:20:14", "bulletinFamily": "software", "description": "## Solution Description\nUpgrade to version 2.9.18 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.\n## References:\nVendor URL: http://www.powerdns.com/\nVendor Specific News/Changelog Entry: http://doc.powerdns.com/changelog.html#CHANGELOG-2-9-18\nSecurity Tracker: 1014504\n[Secunia Advisory ID:16111](https://secuniaresearch.flexerasoftware.com/advisories/16111/)\n[Secunia Advisory ID:16303](https://secuniaresearch.flexerasoftware.com/advisories/16303/)\n[Secunia Advisory ID:16413](https://secuniaresearch.flexerasoftware.com/advisories/16413/)\n[Secunia Advisory ID:16535](https://secuniaresearch.flexerasoftware.com/advisories/16535/)\n[Related OSVDB ID: 18003](https://vulners.com/osvdb/OSVDB:18003)\nOther Advisory URL: http://www.debian.org/security/2005/dsa-771\nOther Advisory URL: http://www.debian.org/security/2005/dsa-773\nOther Advisory URL: http://www.novell.com/linux/security/advisories/2005_19_sr.html\nMail List Post: http://archives.neohapsis.com/archives/bugtraq/2005-07/0262.html\n[CVE-2005-2302](https://vulners.com/cve/CVE-2005-2302)\n", "modified": "2005-07-16T08:51:09", "published": "2005-07-16T08:51:09", "href": "https://vulners.com/osvdb/OSVDB:18004", "id": "OSVDB:18004", "type": "osvdb", "title": "PowerDNS Unauthorized Remote Domain Blank", "cvss": {"score": 2.1, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}}, {"lastseen": "2017-04-28T13:20:14", "bulletinFamily": "software", "description": "## Solution Description\nUpgrade to version 2.9.18 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.\n## References:\nVendor URL: http://www.powerdns.com/\nVendor Specific News/Changelog Entry: http://doc.powerdns.com/changelog.html#CHANGELOG-2-9-18\nSecurity Tracker: 1014504\n[Secunia Advisory ID:16111](https://secuniaresearch.flexerasoftware.com/advisories/16111/)\n[Secunia Advisory ID:16303](https://secuniaresearch.flexerasoftware.com/advisories/16303/)\n[Secunia Advisory ID:16413](https://secuniaresearch.flexerasoftware.com/advisories/16413/)\n[Secunia Advisory ID:16535](https://secuniaresearch.flexerasoftware.com/advisories/16535/)\n[Related OSVDB ID: 18004](https://vulners.com/osvdb/OSVDB:18004)\nOther Advisory URL: http://www.debian.org/security/2005/dsa-771\nOther Advisory URL: http://www.debian.org/security/2005/dsa-773\nOther Advisory URL: http://www.novell.com/linux/security/advisories/2005_19_sr.html\nMail List Post: http://archives.neohapsis.com/archives/bugtraq/2005-07/0262.html\n[CVE-2005-2301](https://vulners.com/cve/CVE-2005-2301)\n", "modified": "2005-07-16T08:51:09", "published": "2005-07-16T08:51:09", "href": "https://vulners.com/osvdb/OSVDB:18003", "id": "OSVDB:18003", "type": "osvdb", "title": "PowerDNS LDAP Backend Unspecified Query Filter Issue", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}}], "openvas": [{"lastseen": "2017-07-02T21:10:10", "bulletinFamily": "scanner", "description": "The remote host is missing an update to the system\nas announced in the referenced advisory.", "modified": "2016-09-28T00:00:00", "published": "2008-09-04T00:00:00", "href": "http://plugins.openvas.org/nasl.php?oid=54410", "id": "OPENVAS:54410", "title": "FreeBSD Ports: powerdns", "type": "openvas", "sourceData": "#\n#VID 43a7b0a7-f9bc-11d9-b473-00061bc2ad93\n# OpenVAS Vulnerability Test\n# $\n# Description: Auto generated from vuxml or freebsd advisories\n#\n# Authors:\n# Thomas Reinke <reinke@securityspace.com>\n#\n# Copyright:\n# Copyright (c) 2008 E-Soft Inc. http://www.securityspace.com\n# Text descriptions are largely excerpted from the referenced\n# advisories, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2,\n# as published by the Free Software Foundation\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\ninclude(\"revisions-lib.inc\");\ntag_insight = \"The following package is affected: powerdns\n\nCVE-2005-2302\nPowerDNS before 2.9.18, when allowing recursion to a restricted range\nof IP addresses, does not properly handle questions from clients that\nare denied recursion, which could cause a 'blank out' of answers to\nthose clients that are allowed to use recursion.\";\ntag_solution = \"Update your system with the appropriate patches or\nsoftware upgrades.\n\nhttp://doc.powerdns.com/security-policy.html\nhttp://marc.theaimsgroup.com/?l=bugtraq&m=112155941310297&w=2\nhttp://www.vuxml.org/freebsd/43a7b0a7-f9bc-11d9-b473-00061bc2ad93.html\";\ntag_summary = \"The remote host is missing an update to the system\nas announced in the referenced advisory.\";\n\n\nif(description)\n{\n script_id(54410);\n script_version(\"$Revision: 4164 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2016-09-28 09:03:16 +0200 (Wed, 28 Sep 2016) $\");\n script_tag(name:\"creation_date\", value:\"2008-09-04 20:41:11 +0200 (Thu, 04 Sep 2008)\");\n script_cve_id(\"CVE-2005-2302\");\n script_tag(name:\"cvss_base\", value:\"2.1\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:N/I:N/A:P\");\n script_name(\"FreeBSD Ports: powerdns\");\n\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2005 E-Soft Inc. http://www.securityspace.com\");\n script_family(\"FreeBSD Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/freebsdrel\", \"login/SSH/success\");\n script_tag(name : \"insight\" , value : tag_insight);\n script_tag(name : \"solution\" , value : tag_solution);\n script_tag(name : \"summary\" , value : tag_summary);\n script_tag(name:\"qod_type\", value:\"package\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n exit(0);\n}\n\n#\n# The script code starts here\n#\n\ninclude(\"pkg-lib-bsd.inc\");\n\ntxt = \"\";\nvuln = 0;\nbver = portver(pkg:\"powerdns\");\nif(!isnull(bver) && revcomp(a:bver, b:\"2.9.18\")<0) {\n txt += 'Package powerdns version ' + bver + ' is installed which is known to be vulnerable.\\n';\n vuln = 1;\n}\n\nif(vuln) {\n security_message(data:string(txt));\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 2.1, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}}]}