Vulnerability Description
Buffer overflow in PowerDNS Recursor before 3.1.7.2 allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via crafted packets.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Powerdns | Recursor | <= 3.1.7.2 |
Related Weaknesses (CWE)
References
- http://doc.powerdns.com/powerdns-advisory-2010-01.html
- http://secunia.com/advisories/38004
- http://secunia.com/advisories/38068Vendor Advisory
- http://securitytracker.com/id?1023403
- http://www.securityfocus.com/archive/1/508743/100/0/threaded
- http://www.securityfocus.com/bid/37650Patch
- http://www.vupen.com/english/advisories/2010/0054Vendor Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=552285
- https://exchange.xforce.ibmcloud.com/vulnerabilities/55438
- https://www.redhat.com/archives/fedora-package-announce/2010-January/msg00217.ht
- https://www.redhat.com/archives/fedora-package-announce/2010-January/msg00228.ht
- http://doc.powerdns.com/powerdns-advisory-2010-01.html
- http://secunia.com/advisories/38004
- http://secunia.com/advisories/38068Vendor Advisory
- http://securitytracker.com/id?1023403
FAQ
What is CVE-2009-4009?
CVE-2009-4009 is a vulnerability with a CVSS score of 10.0 (HIGH). Buffer overflow in PowerDNS Recursor before 3.1.7.2 allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via crafted packets.
How severe is CVE-2009-4009?
CVE-2009-4009 has been rated HIGH with a CVSS base score of 10.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2009-4009?
Check the references section above for vendor advisories and patch information. Affected products include: Powerdns Recursor.