Vulnerability Description
PowerDNS Authoritative daemon , pdns versions 4.0.x before 4.0.9, 4.1.x before 4.1.11, exiting when encountering a serial between 2^31 and 2^32-1 while trying to notify a slave leads to DoS.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Powerdns | Authoritative Server | >= 4.0.0, < 4.0.9 |
| Linux | Linux Kernel | - |
Related Weaknesses (CWE)
References
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10203Issue TrackingThird Party Advisory
- https://doc.powerdns.com/authoritative/security-advisories/powerdns-advisory-201Vendor Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10203Issue TrackingThird Party Advisory
- https://doc.powerdns.com/authoritative/security-advisories/powerdns-advisory-201Vendor Advisory
FAQ
What is CVE-2019-10203?
CVE-2019-10203 is a vulnerability with a CVSS score of 4.3 (MEDIUM). PowerDNS Authoritative daemon , pdns versions 4.0.x before 4.0.9, 4.1.x before 4.1.11, exiting when encountering a serial between 2^31 and 2^32-1 while trying to notify a slave leads to DoS.
How severe is CVE-2019-10203?
CVE-2019-10203 has been rated MEDIUM with a CVSS base score of 4.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2019-10203?
Check the references section above for vendor advisories and patch information. Affected products include: Powerdns Authoritative Server, Linux Linux Kernel.