Anfälligkeitssuche        Suche in 219043 CVE Beschreibungen
und 99761 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.703763
Kategorie:Debian Local Security Checks
Titel:Debian Security Advisory DSA 3763-1 (pdns-recursor - security update)
Zusammenfassung:Florian Heinz and Martin Kluge reported;that pdns-recursor, a recursive DNS server, parses all records present in a query;regardless of whether they are needed or even legitimate, allowing a remote, unauthenticated;attacker to cause an abnormal CPU usage load on the pdns server,;resulting in a partial denial of service if the system becomes;overloaded.
Beschreibung:Summary:
Florian Heinz and Martin Kluge reported
that pdns-recursor, a recursive DNS server, parses all records present in a query
regardless of whether they are needed or even legitimate, allowing a remote, unauthenticated
attacker to cause an abnormal CPU usage load on the pdns server,
resulting in a partial denial of service if the system becomes
overloaded.

Affected Software/OS:
pdns-recursor on Debian Linux

Solution:
For the stable distribution (jessie),
this problem has been fixed in version 3.6.2-2+deb8u3.

We recommend that you upgrade your pdns-recursor packages.

CVSS Score:
7.8

CVSS Vector:
AV:N/AC:L/Au:N/C:N/I:N/A:C

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2016-7068
Debian Security Information: DSA-3763 (Google Search)
https://www.debian.org/security/2017/dsa-3763
Debian Security Information: DSA-3764 (Google Search)
https://www.debian.org/security/2017/dsa-3764
CopyrightCopyright (C) 2017 Greenbone Networks GmbH

Dies ist nur einer von 99761 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2024 E-Soft Inc. Alle Rechte vorbehalten.