CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:N/I:N/A:C
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
AI Score
Confidence
High
EPSS
Percentile
83.7%
Debian Security Advisory DSA-3764-1 [email protected]
https://www.debian.org/security/ Salvatore Bonaccorso
January 13, 2017 https://www.debian.org/security/faq
Package : pdns
CVE ID : CVE-2016-2120 CVE-2016-7068 CVE-2016-7072 CVE-2016-7073
CVE-2016-7074
Multiple vulnerabilities have been discovered in pdns, an authoritative
DNS server. The Common Vulnerabilities and Exposures project identifies
the following problems:
CVE-2016-2120
Mathieu Lafon discovered that pdns does not properly validate
records in zones. An authorized user can take advantage of this flaw
to crash server by inserting a specially crafted record in a zone
under their control and then sending a DNS query for that record.
CVE-2016-7068
Florian Heinz and Martin Kluge reported that pdns parses all records
present in a query regardless of whether they are needed or even
legitimate, allowing a remote, unauthenticated attacker to cause an
abnormal CPU usage load on the pdns server, resulting in a partial
denial of service if the system becomes overloaded.
CVE-2016-7072
Mongo discovered that the webserver in pdns is susceptible to a
denial-of-service vulnerability. A remote, unauthenticated attacker
to cause a denial of service by opening a large number of f TCP
connections to the web server.
CVE-2016-7073 / CVE-2016-7074
Mongo discovered that pdns does not sufficiently validate TSIG
signatures, allowing an attacker in position of man-in-the-middle to
alter the content of an AXFR.
For the stable distribution (jessie), these problems have been fixed in
version 3.4.1-4+deb8u7.
For the unstable distribution (sid), these problems have been fixed in
version 4.0.2-1.
We recommend that you upgrade your pdns packages.
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: [email protected]
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 8 | kfreebsd-i386 | pdns-backend-pgsql | < 3.4.1-4+deb8u7 | pdns-backend-pgsql_3.4.1-4+deb8u7_kfreebsd-i386.deb |
Debian | 8 | amd64 | pdns-backend-pipe | < 3.4.1-4+deb8u7 | pdns-backend-pipe_3.4.1-4+deb8u7_amd64.deb |
Debian | 7 | armhf | pdns-backend-sqlite3 | < 3.1-4.1+deb7u3 | pdns-backend-sqlite3_3.1-4.1+deb7u3_armhf.deb |
Debian | 8 | armhf | pdns-backend-lua | < 3.4.1-4+deb8u7 | pdns-backend-lua_3.4.1-4+deb8u7_armhf.deb |
Debian | 7 | armel | pdns-backend-sqlite | < 3.1-4.1+deb7u3 | pdns-backend-sqlite_3.1-4.1+deb7u3_armel.deb |
Debian | 7 | armhf | pdns-server-dbg | < 3.1-4.1+deb7u3 | pdns-server-dbg_3.1-4.1+deb7u3_armhf.deb |
Debian | 8 | powerpc | pdns-backend-pipe | < 3.4.1-4+deb8u7 | pdns-backend-pipe_3.4.1-4+deb8u7_powerpc.deb |
Debian | 8 | mipsel | pdns-backend-remote | < 3.4.1-4+deb8u7 | pdns-backend-remote_3.4.1-4+deb8u7_mipsel.deb |
Debian | 8 | amd64 | pdns-server | < 3.4.1-4+deb8u7 | pdns-server_3.4.1-4+deb8u7_amd64.deb |
Debian | 8 | i386 | pdns-backend-mysql | < 3.4.1-4+deb8u7 | pdns-backend-mysql_3.4.1-4+deb8u7_i386.deb |
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:N/I:N/A:C
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
AI Score
Confidence
High
EPSS
Percentile
83.7%