Lucene search

K

Powerdns Security Vulnerabilities

cve
cve

CVE-2005-0038

The DNS implementation of PowerDNS 2.9.16 and earlier allows remote attackers to cause a denial of service via a compressed DNS packet with a label length byte with an incorrect offset, which could trigger an infinite loop.

6.6AI Score

0.011EPSS

2006-04-28 01:00 AM
25
cve
cve

CVE-2005-0428

The DNSPacket::expand method in dnspacket.cc in PowerDNS before 2.9.17 allows remote attackers to cause a denial of service by sending a random stream of bytes.

6.3AI Score

0.01EPSS

2005-05-02 04:00 AM
27
cve
cve

CVE-2005-2301

PowerDNS before 2.9.18, when running with an LDAP backend, does not properly escape LDAP queries, which allows remote attackers to cause a denial of service (failure to answer ldap questions) and possibly conduct an LDAP injection attack.

9.4AI Score

0.013EPSS

2005-07-19 04:00 AM
39
cve
cve

CVE-2005-2302

PowerDNS before 2.9.18, when allowing recursion to a restricted range of IP addresses, does not properly handle questions from clients that are denied recursion, which could cause a "blank out" of answers to those clients that are allowed to use recursion.

9.2AI Score

0.001EPSS

2005-07-19 04:00 AM
36
cve
cve

CVE-2006-2069

The recursor in PowerDNS before 3.0.1 allows remote attackers to cause a denial of service (application crash) via malformed EDNS0 packets.

6.5AI Score

0.05EPSS

2006-04-27 01:34 PM
23
cve
cve

CVE-2008-3337

PowerDNS Authoritative Server before 2.9.21.1 drops malformed queries, which might make it easier for remote attackers to poison DNS caches of other products running on other servers, a different issue than CVE-2008-1447 and CVE-2008-3217.

6.8AI Score

0.133EPSS

2008-08-08 07:41 PM
49
cve
cve

CVE-2008-5277

PowerDNS before 2.9.21.2 allows remote attackers to cause a denial of service (daemon crash) via a CH HINFO query.

6.2AI Score

0.006EPSS

2008-12-09 12:30 AM
36
cve
cve

CVE-2017-15090

An issue has been found in the DNSSEC validation component of PowerDNS Recursor from 4.0.0 and up to and including 4.0.6, where the signatures might have been accepted as valid even if the signed data was not in bailiwick of the DNSKEY used to sign it. This allows an attacker in position of man-in-...

5.9CVSS

5.9AI Score

0.001EPSS

2018-01-23 03:29 PM
51