Lines 58-63
Link Here
|
58 |
* Do not forget port variants (linux-f10-libxml2, libxml2, etc.) |
58 |
* Do not forget port variants (linux-f10-libxml2, libxml2, etc.) |
59 |
--> |
59 |
--> |
60 |
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> |
60 |
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> |
|
|
61 |
<vuln vid="f9c5a410-9b4e-11ea-ac3f-6805ca2fa271"> |
62 |
<topic>powerdns-recursor -- multiple vulnerabilities</topic> |
63 |
<affects> |
64 |
<package> |
65 |
<name>powerdns-recursor</name> |
66 |
<range><lt>4.3.1</lt></range> |
67 |
</package> |
68 |
</affects> |
69 |
<description> |
70 |
<body xmlns="http://www.w3.org/1999/xhtml"> |
71 |
<p>PowerDNS Team reports:</p> |
72 |
<blockquote cite="https://doc.powerdns.com/recursor/changelog/4.3.html#change-4.3.1"> |
73 |
<p>CVE-2020-10995: An issue in the DNS protocol has been found that allow malicious parties to use |
74 |
recursive DNS services to attack third party authoritative name servers. The attack uses a crafted |
75 |
reply by an authoritative name server to amplify the resulting traffic between the recursive and |
76 |
other authoritative name servers. Both types of service can suffer degraded performance as an effect.</p> |
77 |
<p>CVE-2020-12244: An issue has been found in PowerDNS Recursor 4.1.0 through 4.3.0 where records in |
78 |
the answer section of a NXDOMAIN response lacking an SOA were not properly validated in |
79 |
SyncRes::processAnswer. This would allow an attacker in position of man-in-the-middle to send a |
80 |
NXDOMAIN answer for a name that does exist, bypassing DNSSEC validation.</p> |
81 |
<p>CVE-2020-10030: An issue has been found in PowerDNS Authoritative Server allowing an attacker |
82 |
with enough privileges to change the system's hostname to cause disclosure of uninitialized memory |
83 |
content via a stack-based out-of-bounds read. It only occurs on systems where gethostname() does |
84 |
not null-terminate the returned string if the hostname is larger than the supplied buffer. Linux |
85 |
systems are not affected because the buffer is always large enough. OpenBSD systems are not affected |
86 |
because the returned hostname is always null-terminated. Under some conditions this issue can lead |
87 |
to the writing of one null-byte out-of-bounds on the stack, causing a denial of service or possibly |
88 |
arbitrary code execution.</p> |
89 |
</blockquote> |
90 |
</body> |
91 |
</description> |
92 |
<references> |
93 |
<url>https://doc.powerdns.com/recursor/security-advisories/index.html</url> |
94 |
<cvename>CVE-2020-10995</cvename> |
95 |
<cvename>CVE-2020-12244</cvename> |
96 |
<cvename>CVE-2020-10030</cvename> |
97 |
</references> |
98 |
<dates> |
99 |
<discovery>2020-05-19</discovery> |
100 |
<entry>2020-05-21</entry> |
101 |
</dates> |
102 |
</vuln> |
103 |
|
61 |
<vuln vid="4d11d37e-9a8d-11ea-b9b8-641c67a117d8"> |
104 |
<vuln vid="4d11d37e-9a8d-11ea-b9b8-641c67a117d8"> |
62 |
<topic>Zabbix -- Remote code execution</topic> |
105 |
<topic>Zabbix -- Remote code execution</topic> |
63 |
<affects> |
106 |
<affects> |