SB2017072046 - Multiple vulnerabilities in PowerDNS Recursor



SB2017072046 - Multiple vulnerabilities in PowerDNS Recursor

Published: July 20, 2017 Updated: June 21, 2025

Security Bulletin ID SB2017072046
Severity
Medium
Patch available
YES
Number of vulnerabilities 2
Exploitation vector Remote access
Highest impact Data manipulation

Breakdown by Severity

Medium 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 2 secuirty vulnerabilities.


1) Input validation error (CVE-ID: CVE-2006-4252)

The vulnerability allows remote attackers to perform a denial of service (DoS) attack.

The vulnerability exists due to insufficient validation of user-supplied input. A remote attacker can cause a denial of service (resource exhaustion and application crash) via a CNAME record with a zero TTL, which triggers an infinite loop.


2) Input validation error (CVE-ID: CVE-2006-4251)

The vulnerability allows a remote non-authenticated attacker to read and manipulate data.

Buffer overflow in PowerDNS Recursor 3.1.3 and earlier might allow remote attackers to execute arbitrary code via a malformed TCP DNS query that prevents Recursor from properly calculating the TCP DNS query length. This vulnerability is addressed in the following product release: PowerDNS, Recursor, 3.1.4


Remediation

Install update from vendor's website.