Debian Security Advisory

DSA-771-1 pdns -- several vulnerabilities

Date Reported:
01 Aug 2005
Affected Packages:
Security database references:
In the Debian bugtracking system: Bug 318798.
In Mitre's CVE dictionary: CVE-2005-2301, CVE-2005-2302.
More information:

Several problems have been discovered in pdns, a versatile nameserver that can lead to a denial of service. The Common Vulnerabilities and Exposures project identifies the following problems:

  • CAN-2005-2301

    Norbert Sendetzky and Jan de Groot discovered that the LDAP backend did not properly escape all queries, allowing it to fail and not answer queries anymore.

  • CAN-2005-2302

    Wilco Baan discovered that queries from clients without recursion permission can temporarily blank out domains to clients with recursion permitted. This enables outside users to blank out a domain temporarily to normal users.

The old stable distribution (woody) does not contain pdns packages.

For the stable distribution (sarge) these problems have been fixed in version 2.9.17-13sarge1.

For the unstable distribution (sid) these problems have been fixed in version 2.9.18-1.

We recommend that you upgrade your pdns package.

Fixed in:

Debian GNU/Linux 3.1 (sarge)

Architecture-independent component:
Intel IA-32:
Intel IA-64:
Motorola 680x0:
Big endian MIPS:
Little endian MIPS:
IBM S/390:
Sun Sparc:

MD5 checksums of the listed files are available in the original advisory.