Input validation error in PowerDNS Authoritative - CVE-2015-5311
Published: December 7, 2016 / Updated: June 21, 2025
Vulnerability identifier: #VU111733
CSH Severity: Medium
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Green
CVE-ID: CVE-2015-5311
CWE-ID: CWE-20
Exploitation vector: Remote access
Exploit availability:
No public exploit available
Vendor: PowerDNS.COM B.V.
Affected software:
PowerDNS Authoritative
PowerDNS Authoritative
Detailed vulnerability description
The vulnerability allows a remote non-authenticated attacker to perform service disruption.
PowerDNS (aka pdns) Authoritative Server 3.4.4 before 3.4.7 allows remote attackers to cause a denial of service (assertion failure and server crash) via crafted query packets.
How to mitigate CVE-2015-5311
Install update from vendor's website.
Sources
- http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171865.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171976.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172193.html
- http://www.openwall.com/lists/oss-security/2015/11/09/3
- http://www.securitytracker.com/id/1034098
- https://doc.powerdns.com/md/security/powerdns-advisory-2015-03/