Debian: DSA-3664-1: pdns security update

    Date10 Sep 2016
    CategoryDebian
    43
    Posted ByLinuxSecurity Advisories
    Multiple vulnerabilities have been discovered in pdns, an authoritative DNS server. The Common Vulnerabilities and Exposures project identifies the following problems:
    
    - -------------------------------------------------------------------------
    Debian Security Advisory DSA-3664-1                   This email address is being protected from spambots. You need JavaScript enabled to view it.
    https://www.debian.org/security/                     Salvatore Bonaccorso
    September 10, 2016                    https://www.debian.org/security/faq
    - -------------------------------------------------------------------------
    
    Package        : pdns
    CVE ID         : CVE-2016-5426 CVE-2016-5427 CVE-2016-6172
    Debian Bug     : 830808
    
    Multiple vulnerabilities have been discovered in pdns, an authoritative
    DNS server. The Common Vulnerabilities and Exposures project identifies
    the following problems:
    
    CVE-2016-5426 / CVE-2016-5427
    
        Florian Heinz and Martin Kluge reported that the PowerDNS
        Authoritative Server accepts queries with a qname's length larger
        than 255 bytes and does not properly handle dot inside labels. A
        remote, unauthenticated attacker can take advantage of these flaws
        to cause abnormal load on the PowerDNS backend by sending specially
        crafted DNS queries, potentially leading to a denial of service.
    
    CVE-2016-6172
    
        It was reported that a malicious primary DNS server can crash a
        secondary PowerDNS server due to improper restriction of zone size
        limits. This update adds a feature to limit AXFR sizes in response
        to this flaw.
    
    For the stable distribution (jessie), these problems have been fixed in
    version 3.4.1-4+deb8u6.
    
    We recommend that you upgrade your pdns packages.
    
    Further information about Debian Security Advisories, how to apply
    these updates to your system and frequently asked questions can be
    found at: https://www.debian.org/security/
    
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
    
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"39","type":"x","order":"1","pct":51.32,"resources":[]},{"id":"88","title":"Should be more technical","votes":"11","type":"x","order":"2","pct":14.47,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"26","type":"x","order":"3","pct":34.21,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.