You are here
Home > Preporuke > Sigurnosni nedostatak programskog paketa PowerDNS

Sigurnosni nedostatak programskog paketa PowerDNS

– – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – –
Gentoo Linux Security Advisory GLSA 202012-18
– – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – –
https://security.gentoo.org/
– – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – –

Severity: Low
Title: PowerDNS: information disclosure
Date: December 23, 2020
Bugs: #744160
ID: 202012-18

– – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – –

Synopsis
========

An information disclosure vulnerability in PowerDNS allow remote
attackers to obtain sensitive information.

Background
==========

The PowerDNS nameserver is an authoritative-only nameserver which uses
a flexible backend architecture.

Affected packages
=================

——————————————————————-
Package / Vulnerable / Unaffected
——————————————————————-
1 net-dns/pdns < 4.3.1 >= 4.3.1

Description
===========

It was discovered that PowerDNS did not properly handle certain unknown
records.

Impact
======

An authorized attacker with the ability to insert crafted records into
a zone might be able to leak the content of uninitialized memory.
Crafted records cannot be inserted via AXFR.

Workaround
==========

Do not take zone data from untrusted users.

Resolution
==========

All PowerDNS users should upgrade to the latest version:

# emerge –sync
# emerge –ask –oneshot –verbose “>=net-dns/pdns-4.3.1”

References
==========

[ 1 ] CVE-2020-17482
https://nvd.nist.gov/vuln/detail/CVE-2020-17482
[ 2 ] PowerDNS Security Advisory 2020-05

https://docs.powerdns.com/authoritative/security-advisories/powerdns-advisory-2020-05.html

Availability
============

This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

https://security.gentoo.org/glsa/202012-18

Concerns?
=========

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users’ machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.

License
=======

Copyright 2020 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons – Attribution / Share Alike license.

https://creativecommons.org/licenses/by-sa/2.5

—–BEGIN PGP SIGNATURE—–

wsB5BAABCAAjFiEEExKRzo+LDXJgXHuURObr3Jv2BVkFAl/jpHEFAwAAAAAACgkQRObr3Jv2BVmS
Vwf+ONiKTr7xYylyvq04EstoMnpNdMoEO7iquw1t9vfn80a6Eqo1zGB0hIS/re/LrZWEHnCuwxN/
0cKyaYvJ79drXjhsqQVVW3Iopt4cUxmNepCXhoYv7RoCPlU5CR4hC5kbAbGwQXDUwsN4XC1zTLPm
z+1H9mVYDUmVTb2AOxgOj8cl66DsQsauY8cVuoaRyZjO+2aaTgJVL3ZAFK995uUS4J3aPqGYYKUw
OxF8lf0iRIhYD5sKh0VYnyBb5xBmZ8SosdqyZqhG1xsLs+zQ1jKDLqQqWoKYDVUOzMHJu948lReM
lxg7cKE7N16jeRjRozOAZt2yzRTxN/x7BoWhr4JsqQ==
=OsUe
—–END PGP SIGNATURE—–

Top
More in Preporuke
Sigurnosni nedostatak programskog paketa D-Bus

Otkriven je sigurnosni nedostatak u programskom paketu D-Bus za operacijski sustav Gentoo. Otkriveni nedostatak potencijalnim napadačima omogućuje izvođenje napada uskraćivanjem...

Close