Linux Security
    Linux Security
    Linux Security

    Debian: DSA-3664-1: pdns security update

    Date 10 Sep 2016
    118
    Posted By LinuxSecurity Advisories
    Multiple vulnerabilities have been discovered in pdns, an authoritative DNS server. The Common Vulnerabilities and Exposures project identifies the following problems:
    
    - -------------------------------------------------------------------------
    Debian Security Advisory DSA-3664-1                   This email address is being protected from spambots. You need JavaScript enabled to view it.
    https://www.debian.org/security/                     Salvatore Bonaccorso
    September 10, 2016                    https://www.debian.org/security/faq
    - -------------------------------------------------------------------------
    
    Package        : pdns
    CVE ID         : CVE-2016-5426 CVE-2016-5427 CVE-2016-6172
    Debian Bug     : 830808
    
    Multiple vulnerabilities have been discovered in pdns, an authoritative
    DNS server. The Common Vulnerabilities and Exposures project identifies
    the following problems:
    
    CVE-2016-5426 / CVE-2016-5427
    
        Florian Heinz and Martin Kluge reported that the PowerDNS
        Authoritative Server accepts queries with a qname's length larger
        than 255 bytes and does not properly handle dot inside labels. A
        remote, unauthenticated attacker can take advantage of these flaws
        to cause abnormal load on the PowerDNS backend by sending specially
        crafted DNS queries, potentially leading to a denial of service.
    
    CVE-2016-6172
    
        It was reported that a malicious primary DNS server can crash a
        secondary PowerDNS server due to improper restriction of zone size
        limits. This update adds a feature to limit AXFR sizes in response
        to this flaw.
    
    For the stable distribution (jessie), these problems have been fixed in
    version 3.4.1-4+deb8u6.
    
    We recommend that you upgrade your pdns packages.
    
    Further information about Debian Security Advisories, how to apply
    these updates to your system and frequently asked questions can be
    found at: https://www.debian.org/security/
    
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
    

    LinuxSecurity Poll

    'Tis the season of giving! How have you given back to the open-source community?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/49-tis-the-season-of-giving-how-have-you-given-back-to-the-open-source-community?task=poll.vote&format=json
    49
    radio
    [{"id":"171","title":"I've contributed to the development of an open-source project.","votes":"8","type":"x","order":"1","pct":28.57,"resources":[]},{"id":"172","title":"I've reviewed open-source code for security bugs.","votes":"6","type":"x","order":"2","pct":21.43,"resources":[]},{"id":"173","title":"I've made a donation to an open-source project.","votes":"14","type":"x","order":"3","pct":50,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350

    Please vote first in order to view vote results.


    VIEW MORE POLLS

    bottom 200

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.