Sophie

Sophie

distrib > Mageia > 4 > x86_64 > by-pkgid > a80c2a17c20d38e6a349bb777eb92ba4 > files > 103

pdns-3.3.2-1.mga4.x86_64.rpm

<?xml version="1.0" encoding="UTF-8" standalone="no"?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><title>11. PowerDNS Security Advisory 2010-02: PowerDNS Recursor up to and including 3.1.7.1 can be spoofed into accepting bogus data</title><link rel="stylesheet" href="docbook.css" type="text/css" /><meta name="generator" content="DocBook XSL Stylesheets V1.75.2" /><link rel="home" href="index.html" title="PowerDNS manual" /><link rel="up" href="powerdns.html" title="Chapter 1. The PowerDNS dynamic nameserver" /><link rel="prev" href="powerdns-advisory-2010-01.html" title="10. PowerDNS Security Advisory 2010-01: PowerDNS Recursor up to and including 3.1.7.1 can be brought down and probably exploited" /><link rel="next" href="powerdns-advisory-2012-01.html" title="12. PowerDNS Security Advisory 2012-01: PowerDNS Authoritative Server can be caused to generate a traffic loop" /></head><body><div class="navheader"><table width="100%" summary="Navigation header"><tr><th colspan="3" align="center">11. PowerDNS Security Advisory 2010-02: PowerDNS Recursor up to and including 3.1.7.1 can be spoofed into accepting bogus data</th></tr><tr><td width="20%" align="left"><a accesskey="p" href="powerdns-advisory-2010-01.html">Prev</a> </td><th width="60%" align="center">Chapter 1. The PowerDNS dynamic nameserver</th><td width="20%" align="right"> <a accesskey="n" href="powerdns-advisory-2012-01.html">Next</a></td></tr></table><hr /></div><div class="sect1" title="11. PowerDNS Security Advisory 2010-02: PowerDNS Recursor up to and including 3.1.7.1 can be spoofed into accepting bogus data"><div class="titlepage"><div><div><h2 class="title" style="clear: both"><a id="powerdns-advisory-2010-02"></a>11. PowerDNS Security Advisory 2010-02: PowerDNS Recursor up to and including 3.1.7.1 can be spoofed into accepting bogus data</h2></div></div></div><p>
	</p><div class="table"><a id="idp50272"></a><p class="title"><b>Table 1.7. PowerDNS Security Advisory</b></p><div class="table-contents"><table summary="PowerDNS Security Advisory" border="1"><colgroup><col /><col /></colgroup><tbody><tr><td>
		  CVE
		</td><td>
		  CVE-2009-4010
		</td></tr><tr><td>
		  Date
		</td><td>
		  6th of January 2010
		</td></tr><tr><td>
		  Affects
		</td><td>
		  PowerDNS Recursor 3.1.7.1 and earlier
		</td></tr><tr><td>
		  Not affected
		</td><td>
		  No versions of the PowerDNS Authoritative ('pdns_server') are affected. 
		</td></tr><tr><td>
		  Severity 
		</td><td>
		  High
		</td></tr><tr><td>
		  Impact
		</td><td>
		  Using smart techniques, it is possible to fool the PowerDNS Recursor into accepting unauthorized data
		</td></tr><tr><td>
		  Exploit
		</td><td>
		  Withheld
		</td></tr><tr><td>
		  Solution
		</td><td>
		  Upgrade to PowerDNS Recursor 3.1.7.2 or higher
		</td></tr><tr><td>
		  Workaround
		</td><td>
		  None. 
		</td></tr></tbody></table></div></div><p><br class="table-break" />
      </p><p>
	Using specially crafted zones, it is possible to fool the PowerDNS Recursor into accepting bogus data. This data might be harmful to your users.
	An attacker would be able to divert data from, say, bigbank.com to an IP address of his choosing.
      </p><p>
	This vulnerability was discovered by a third party that (for now) prefers not to be named. PowerDNS is very grateful however for their help in 
	improving PowerDNS security.
      </p></div><div class="navfooter"><hr /><table width="100%" summary="Navigation footer"><tr><td width="40%" align="left"><a accesskey="p" href="powerdns-advisory-2010-01.html">Prev</a> </td><td width="20%" align="center"><a accesskey="u" href="powerdns.html">Up</a></td><td width="40%" align="right"> <a accesskey="n" href="powerdns-advisory-2012-01.html">Next</a></td></tr><tr><td width="40%" align="left" valign="top">10. PowerDNS Security Advisory 2010-01: PowerDNS Recursor up to and including 3.1.7.1 can be brought down and probably exploited </td><td width="20%" align="center"><a accesskey="h" href="index.html">Home</a></td><td width="40%" align="right" valign="top"> 12. PowerDNS Security Advisory 2012-01: PowerDNS Authoritative Server can be caused to generate a traffic loop</td></tr></table></div></body></html>