[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[SECURITY] [DLA 798-1] pdns security update



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Package        : pdns
Version        : 3.1-4.1+deb7u3
CVE ID         : CVE-2016-2120 CVE-2016-7068 CVE-2016-7072 CVE-2016-7073
                 CVE-2016-7074


Multiple vulnerabilities have been discovered in pdns, an authoritative
DNS server. The Common Vulnerabilities and Exposures project identifies
the following problems:

CVE-2016-2120

    Mathieu Lafon discovered that pdns does not properly validate
    records in zones. An authorized user can take advantage of this flaw
    to crash server by inserting a specially crafted record in a zone
    under their control and then sending a DNS query for that record.

CVE-2016-7068

    Florian Heinz and Martin Kluge reported that pdns parses all records
    present in a query regardless of whether they are needed or even
    legitimate, allowing a remote, unauthenticated attacker to cause an
    abnormal CPU usage load on the pdns server, resulting in a partial
    denial of service if the system becomes overloaded.

CVE-2016-7072

    Mongo discovered that the webserver in pdns is susceptible to a
    denial-of-service vulnerability. A remote, unauthenticated attacker
    to cause a denial of service by opening a large number of f TCP
    connections to the web server.

CVE-2016-7073 / CVE-2016-7074

    Mongo discovered that pdns does not sufficiently validate TSIG
    signatures, allowing an attacker in position of man-in-the-middle to
    alter the content of an AXFR.

For Debian 7 "Wheezy", these problems have been fixed in version
3.1-4.1+deb7u3.

We recommend that you upgrade your pdns packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

- -- 
Jonas Meurer


-----BEGIN PGP SIGNATURE-----
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=0WI/
-----END PGP SIGNATURE-----


Reply to: