Remote Code Execution Vulnerability in PowerDNS Authoritative Server by PowerDNS
CVE-2019-10163
3.5LOW
Summary
A vulnerability in the PowerDNS Authoritative Server allows a remote, authorized master server to erroneously trigger a significant CPU load and disrupt further updates to any slave zone. This occurs when an attacker sends an excessive number of NOTIFY messages to slave servers. It is essential for system administrators using PowerDNS to be aware of this issue, especially those operating versions prior to 4.1.9 and 4.0.8, as only servers configured as slaves are susceptible.
Affected Version(s)
pdns fixed in 4.1.9
pdns fixed in 4.0.8
References
CVSS V3.1
Score:
3.5
Severity:
LOW
Confidentiality:
None
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
Required
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved