Vulnerability Description
The label decompression functionality in PowerDNS Recursor 3.5.x, 3.6.x before 3.6.3, and 3.7.x before 3.7.2 and Authoritative (Auth) Server 3.2.x, 3.3.x before 3.3.2, and 3.4.x before 3.4.4 allows remote attackers to cause a denial of service (CPU consumption or crash) via a request with a name that refers to itself.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Powerdns | Authoritative | 3.2 |
| Fedoraproject | Fedora | 20 |
| Powerdns | Recursor | 3.5 |
Related Weaknesses (CWE)
References
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156648.htmlThird Party Advisory
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156655.htmlThird Party Advisory
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156667.htmlThird Party Advisory
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156680.htmlThird Party Advisory
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156725.htmlThird Party Advisory
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156743.htmlThird Party Advisory
- http://www.debian.org/security/2015/dsa-3306
- http://www.debian.org/security/2015/dsa-3307
- http://www.securityfocus.com/bid/74306Third Party Advisory
- http://www.securitytracker.com/id/1032220Third Party Advisory
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156648.htmlThird Party Advisory
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156655.htmlThird Party Advisory
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156667.htmlThird Party Advisory
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156680.htmlThird Party Advisory
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156725.htmlThird Party Advisory
FAQ
What is CVE-2015-1868?
CVE-2015-1868 is a vulnerability with a CVSS score of 7.8 (HIGH). The label decompression functionality in PowerDNS Recursor 3.5.x, 3.6.x before 3.6.3, and 3.7.x before 3.7.2 and Authoritative (Auth) Server 3.2.x, 3.3.x before 3.3.2, and 3.4.x before 3.4.4 allows re...
How severe is CVE-2015-1868?
CVE-2015-1868 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2015-1868?
Check the references section above for vendor advisories and patch information. Affected products include: Powerdns Authoritative, Fedoraproject Fedora, Powerdns Recursor.