CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
LOW
Integrity Impact
NONE
Availability Impact
LOW
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
AI Score
Confidence
High
EPSS
Percentile
87.9%
A vulnerability was found in PowerDNS Authoritative Server before 4.0.7 and before 4.1.7. An insufficient validation of data coming from the user when building a HTTP request from a DNS query in the HTTP Connector of the Remote backend, allowing a remote user to cause a denial of service by making the server connect to an invalid endpoint, or possibly information disclosure by making the server connect to an internal endpoint and somehow extracting meaningful information about the response
[
{
"product": "pdns",
"vendor": "The PowerDNS Project",
"versions": [
{
"status": "affected",
"version": "4.1.7"
},
{
"status": "affected",
"version": "4.0.7"
}
]
}
]
lists.opensuse.org/opensuse-security-announce/2019-04/msg00022.html
www.openwall.com/lists/oss-security/2019/03/18/4
www.securityfocus.com/bid/107491
bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3871
doc.powerdns.com/authoritative/security-advisories/powerdns-advisory-2019-03.html
lists.debian.org/debian-lts-announce/2019/03/msg00039.html
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GWUHF6MRSQ3YO7UUISGLV7MXCAGBW2VD/
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ROFI6OTWF4GKONNSNEDUCW6LVSSEBZNF/
seclists.org/bugtraq/2019/Apr/8
www.debian.org/security/2019/dsa-4424
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
LOW
Integrity Impact
NONE
Availability Impact
LOW
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
AI Score
Confidence
High
EPSS
Percentile
87.9%