Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Date: Mon, 26 Nov 2018 17:14:58 +0100
From: Remi Gacogne <remi.gacogne@...erdns.com>
To: oss-security@...ts.openwall.com
Subject: PowerDNS Security Advisory 2018-09

Hi all,

We just released PowerDNS Recursor 4.1.8, fixing a minor security issue
that we recently discovered, affecting PowerDNS Recursor from 4.1.0 up
to and including 4.1.7.

The issue is that a remote attacker can trigger an out-of-bounds memory
read via a crafted query, while computing the hash of the query for a
packet cache lookup, possibly leading to a crash.

When the PowerDNS Recursor is run inside a supervisor like supervisord
or systemd, a crash will lead to an automatic restart,
limiting the impact to a somewhat degraded service.

This issue has been assigned CVE-2018-16855 by Red Hat.

The full security advisory is provided below, and can also be
found at
https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2018-09.html

A minimal patch can also be found here:
https://downloads.powerdns.com/patches/2018-09/

Please feel free to contact me directly if you have any question.

Best regards,

Remi Gacogne
PowerDNS.COM BV - https://www.powerdns.com/

PowerDNS Security Advisory 2018-09: Crafted query can cause a denial of
service
===============================================================================

-  CVE: CVE-2018-16855
-  Date: 26th of November 2018
-  Affects: PowerDNS Recursor from 4.1.0 up to and including 4.1.7
-  Not affected: 4.0.x, 4.1.8
-  Severity: Medium
-  Impact: Denial of service
-  Exploit: This problem can be triggered via crafted queries
-  Risk of system compromise: No
-  Solution: Upgrade to a non-affected version

An issue has been found in PowerDNS Recursor where a remote attacker
sending a DNS query can trigger an out-of-bounds memory read while
computing the hash of the query for a packet cache lookup, possibly
leading to a crash.

This issue has been assigned CVE-2018-16855 by Red Hat.

When the PowerDNS Recursor is run inside a supervisor like supervisord
or systemd, a crash will lead to an automatic restart, limiting the
impact to a somewhat degraded service.

PowerDNS Recursor from 4.1.0 up to and including 4.1.7 is affected.



Download attachment "signature.asc" of type "application/pgp-signature" (489 bytes)

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.