CVE-2019-10162

Name
CVE-2019-10162
Description
A vulnerability has been found in PowerDNS Authoritative Server before versions 4.1.10, 4.0.8 allowing an authorized user to cause the server to exit by inserting a crafted record in a MASTER type zone under their control. The issue is due to the fact that the Authoritative Server will exit when it runs into a parsing error while looking up the NS/A/AAAA records it is about to use for an outgoing notify.
NVD Severity
medium
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
Release Notes https://blog.powerdns.com/2019/06/21/powerdns-authoritative-server-4-0-8-and-4-1-10-released/
Vendor Advisory https://doc.powerdns.com/authoritative/security-advisories/powerdns-advisory-2019-04.html
Issue Tracking https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10162
Mailing List http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00036.html
Mailing List http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00054.html

Match rules

CPE URI Source package Min version Max version
cpe:2.3:a:powerdns:authoritative:*:*:*:*:*:*:*:* authoritative >= 4.1.0 < 4.1.10
cpe:2.3:a:powerdns:authoritative:*:*:*:*:*:*:*:* authoritative >= 4.0.0 < 4.0.8
cpe:2.3:a:powerdns:authoritative:4.0.0:-:*:*:*:*:*:* authoritative == None == 4.0.0

Vulnerable and fixed packages

Source package Branch Version Maintainer Status