ArchLinux: 201805-1: powerdns: arbitrary code execution
Summary
An issue has been found in the dnsreplay tool provided with PowerDNS Authoritative, where replaying a specially crafted PCAP file can trigger a stack based buffer overflow, leading to a crash and potentially arbitrary code execution. This buffer overflow only occurswhen the --ecs-stamp option of dnsreplay is used. Regardless of this issue, the use of dnsreplay with untrusted PCAP files is not advised.
Resolution
Upgrade to 4.1.2-1.
# pacman -Syu "powerdns>=4.1.2-1"
The problem has been fixed upstream in version 4.1.2.
References
https://marc.info/?l=oss-security&m=152585376901543 https://github.com/PowerDNS/pdns/commit/f9c57c98da1b1007a51680629b667d57d9b702b8 https://doc.powerdns.com/authoritative/security-advisories/powerdns-advisory-2018-02.html https://security.archlinux.org/CVE-2018-1046
Workaround
None.