ID

VAR-201001-0677


CVE

CVE-2009-4010


TITLE

PowerDNS Recursor Remote Cache Poisoning Vulnerability

Trust: 1.5

sources: CNVD: CNVD-2010-5502 // BID: 37653 // CNNVD: CNNVD-201001-052

DESCRIPTION

Unspecified vulnerability in PowerDNS Recursor before 3.1.7.2 allows remote attackers to spoof DNS data via crafted zones. PowerDNS Recursor is a high performance recursive name server. A remote attacker can trick PowerDNS Recursor into accepting malicious data. The server may incorrectly add records to its cache during parsing of recursive client queries. This is a case of cache poisoning. DNS cache poisoning refers to changing an item in the DNS cache of the DNS server so that the IP address associated with the host name in the cache no longer points to the correct location. For example, if www.example.com maps to the IP address 192.168.0.1 and the mapping exists in the DNS server's cache, an attacker who successfully poisons the server's DNS cache can map www.example.com to 10.0. 0.1. In this case, a user attempting to access www.example.com may contact the wrong web server. PowerDNS is prone to a remote cache-poisoning vulnerability. An attacker can exploit this issue to divert data from a legitimate site to an attacker-specified site. Successful exploits will allow the attacker to manipulate cache data, potentially facilitating man-in-the-middle, site-impersonation, or denial-of-service attacks. PowerDNS 3.1.7.1 and earlier are vulnerable. (Note that the etch version of pdns-recursor was not vulnerable to CVE-2009-4009.) Extra care should be applied when installing this update. Major differences in internal domain name processing made backporting just the security fix too difficult. For more information: SA38004 SOLUTION: Apply updated packages using the yum utility ("yum update pdns-recursor"). ---------------------------------------------------------------------- Accurate Vulnerability Scanning No more false positives, no more false negatives http://secunia.com/vulnerability_scanning/ ---------------------------------------------------------------------- TITLE: PowerDNS Recursor Spoofing and Buffer Overflow Vulnerabilities SECUNIA ADVISORY ID: SA38004 VERIFY ADVISORY: http://secunia.com/advisories/38004/ DESCRIPTION: Some vulnerabilities have been reported in PowerDNS Recursor, which can be exploited by malicious people to conduct spoofing attacks and potentially compromise a vulnerable system. 1) An unspecified error exists when handling certain specially crafted packets, which can be exploited to cause a buffer overflow. Successful exploitation may allow execution of arbitrary code. The vulnerabilities are reported in PowerDNS Recursor version 3.1.7.1 and prior. PowerDNS Authoritative ('pdns_server') is not affected. SOLUTION: Update to version 3.1.7.2. http://www.powerdns.com/en/downloads.aspx PROVIDED AND/OR DISCOVERED BY: The vendor credits anonymous third parties. ORIGINAL ADVISORY: 1) http://doc.powerdns.com/powerdns-advisory-2010-01.html 2) http://doc.powerdns.com/powerdns-advisory-2010-02.html ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ---------------------------------------------------------------------- . - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201412-33 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Severity: High Title: PowerDNS Recursor: Multiple vulnerabilities Date: December 22, 2014 Bugs: #299942, #404377, #514946, #531992 ID: 201412-33 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Synopsis ======== Multiple vulnerabilities have been found in PowerDNS Recursor, the worst of which may allow execution of arbitrary code. Background ========== PowerDNS Recursor is a high-end, high-performance resolving name server Affected packages ================= ------------------------------------------------------------------- Package / Vulnerable / Unaffected ------------------------------------------------------------------- 1 net-dns/pdns-recursor < 3.6.1-r1 >= 3.6.1-r1 Description =========== Multiple vulnerabilities have been discovered in PowerDNS Recursor. Please review the CVE identifiers and PowerDNS blog post referenced below for details. Impact ====== A remote attacker may be able to send specially crafted packets, possibly resulting in arbitrary code execution or a Denial of Service condition. Workaround ========== There is no known workaround at this time. Resolution ========== All PowerDNS Recursor users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=net-dns/pdns-recursor-3.6.1-r1"= References ========== [ 1 ] CVE-2009-4009 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4009 [ 2 ] CVE-2009-4010 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4010 [ 3 ] CVE-2012-1193 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1193 [ 4 ] CVE-2014-8601 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8601 [ 5 ] Related to recent DoS attacks: Recursor configuration file guidance http://blog.powerdns.com/2014/02/06/related-to-recent-dos-attacks-recurso= r-configuration-file-guidance/ Availability ============ This GLSA and any updates to it are available for viewing at the Gentoo Security Website: http://security.gentoo.org/glsa/glsa-201412-33.xml Concerns? ========= Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org. License ======= Copyright 2014 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. http://creativecommons.org/licenses/by-sa/2.5 . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - ------------------------------------------------------------------------ Debian Security Advisory DSA-1968-1 security@debian.org http://www.debian.org/security/ Florian Weimer January 08, 2010 http://www.debian.org/security/faq - ------------------------------------------------------------------------ Package : pdns-recursor Vulnerability : several Problem type : remote Debian-specific: no CVE Id(s) : CVE-2009-4009 CVE-2009-4010 It was discovered that pdns-recursor, the PowerDNS recursive name server, contains several vulnerabilities: A buffer overflow can be exploited to crash the daemon, or potentially execute arbitrary code (CVE-2009-4009). For the old stable distribution (etch), fixed packages will be provided soon. For the stable distribution (lenny), these problems have been fixed in version 3.1.7-1+lenny1. For the unstable distribution (sid), these problems have been fixed in version 3.1.7.2-1. We recommend that you upgrade your pdns-recursor package. Upgrade instructions - -------------------- wget url will fetch the file for you dpkg -i file.deb will install the referenced file. If you are using the apt-get package manager, use the line for sources.list as given below: apt-get update will update the internal database apt-get upgrade will install corrected packages You may use an automated update by adding the resources from the footer to the proper configuration. Debian GNU/Linux 5.0 alias lenny - -------------------------------- Source archives: http://security.debian.org/pool/updates/main/p/pdns-recursor/pdns-recursor_3.1.7.orig.tar.gz Size/MD5 checksum: 211760 38c58fef666685d6756da97baf9b4d51 http://security.debian.org/pool/updates/main/p/pdns-recursor/pdns-recursor_3.1.7-1+lenny1.dsc Size/MD5 checksum: 1654 fff9beb43eec355ca42d93d53c1ce299 http://security.debian.org/pool/updates/main/p/pdns-recursor/pdns-recursor_3.1.7-1+lenny1.diff.gz Size/MD5 checksum: 14769 8794fecd11f1b014592e2a36d40aaaf6 alpha architecture (DEC Alpha) http://security.debian.org/pool/updates/main/p/pdns-recursor/pdns-recursor_3.1.7-1+lenny1_alpha.deb Size/MD5 checksum: 545726 dc05fab76c0fcb051b9a428cfa126061 amd64 architecture (AMD x86_64 (AMD64)) http://security.debian.org/pool/updates/main/p/pdns-recursor/pdns-recursor_3.1.7-1+lenny1_amd64.deb Size/MD5 checksum: 440822 365fc4da2fd1770f8e62f1a3a0046231 i386 architecture (Intel ia32) http://security.debian.org/pool/updates/main/p/pdns-recursor/pdns-recursor_3.1.7-1+lenny1_i386.deb Size/MD5 checksum: 440686 ac26d27658892619ce539921796bce67 ia64 architecture (Intel ia64) http://security.debian.org/pool/updates/main/p/pdns-recursor/pdns-recursor_3.1.7-1+lenny1_ia64.deb Size/MD5 checksum: 631308 f80c2d28ee6d9ebdbf6cad177c8fbddd powerpc architecture (PowerPC) http://security.debian.org/pool/updates/main/p/pdns-recursor/pdns-recursor_3.1.7-1+lenny1_powerpc.deb Size/MD5 checksum: 463434 f0bba833d4231bb2237433373e888a12 s390 architecture (IBM S/390) http://security.debian.org/pool/updates/main/p/pdns-recursor/pdns-recursor_3.1.7-1+lenny1_s390.deb Size/MD5 checksum: 428138 994a5190fa0f73b49252bee0a695fb4d These files will probably be moved into the stable distribution on its next update. - --------------------------------------------------------------------------------- For apt-get: deb http://security.debian.org/ stable/updates main For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main Mailing list: debian-security-announce@lists.debian.org Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg> -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (GNU/Linux) iQEcBAEBAgAGBQJLR6jtAAoJEL97/wQC1SS+RxkH/0esg7lQO3qDCRJw32DPNjI0 zlHI6Z6jvWyhYnitqfrzuXdgU18Nq5txdLvJlllQOtxVOnwXAaVOSHCELc0c4i2D DC0JLWGm43n6RBxEteJsx83xN5yucVg4c7KvSjDM2lHkcOnXL+Z6Qz93pFgoL9wF x6uBdBBV3+YqrvHvl8hV0fHQPyMYvE6x2sJ5eBm6bluXCPgNYviFtiCTx1HUUTBn csGvkDSX81vFe07AKWr41ZiC0p5vesyJC4V6ljB2l9UWPLGT1pKZSuByfdNYMgvV guGTqguJzcjaoQ8Cn619Rmqn513N8itRyIqb8gI9E+YmcizBIdLHDi4JSsD/ikA= =XCaJ -----END PGP SIGNATURE----- _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/

Trust: 2.88

sources: NVD: CVE-2009-4010 // JVNDB: JVNDB-2010-005035 // CNVD: CNVD-2010-5502 // BID: 37653 // PACKETSTORM: 85750 // PACKETSTORM: 85262 // PACKETSTORM: 85277 // PACKETSTORM: 129691 // PACKETSTORM: 84957

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2010-5502

AFFECTED PRODUCTS

vendor:powerdnsmodel:recursorscope:eqversion:3.1.7

Trust: 1.6

vendor:powerdnsmodel:recursorscope:eqversion:2.9.17

Trust: 1.6

vendor:powerdnsmodel:recursorscope:eqversion:3.1.7.1

Trust: 1.6

vendor:powerdnsmodel:recursorscope:eqversion:2.9.15

Trust: 1.6

vendor:powerdnsmodel:recursorscope:eqversion:2.8

Trust: 1.6

vendor:powerdnsmodel:recursorscope:eqversion:2.0_rc1

Trust: 1.6

vendor:powerdnsmodel:recursorscope:eqversion:3.1.5

Trust: 1.6

vendor:powerdnsmodel:recursorscope:eqversion:3.1.4

Trust: 1.6

vendor:powerdnsmodel:recursorscope:eqversion:3.1.6

Trust: 1.6

vendor:powerdnsmodel:recursorscope:eqversion:2.9.16

Trust: 1.0

vendor:powerdnsmodel:recursorscope:eqversion:3.1

Trust: 1.0

vendor:powerdnsmodel:recursorscope:eqversion:2.9.18

Trust: 1.0

vendor:powerdnsmodel:recursorscope:eqversion:3.1.2

Trust: 1.0

vendor:powerdnsmodel:recursorscope:eqversion:3.0.1

Trust: 1.0

vendor:powerdnsmodel:recursorscope:eqversion:3.0

Trust: 1.0

vendor:powerdnsmodel:recursorscope:eqversion:3.1.1

Trust: 1.0

vendor:powerdnsmodel:recursorscope:eqversion:3.1.3

Trust: 1.0

vendor:powerdnsmodel:recursorscope:lteversion:3.1.7.2

Trust: 1.0

vendor:powerdnsmodel:recursorscope:ltversion:3.1.7.2

Trust: 0.8

vendor:redmodel:hat fedorascope:eqversion:16

Trust: 0.6

vendor:powerdnsmodel:recursorscope:eqversion:3.1.7.2

Trust: 0.6

vendor:s u s emodel:opensusescope:eqversion:11.2

Trust: 0.3

vendor:s u s emodel:opensusescope:eqversion:11.1

Trust: 0.3

vendor:s u s emodel:opensusescope:eqversion:11.0

Trust: 0.3

vendor:powerdnsmodel:powerdnsscope:eqversion:3.1.7.1

Trust: 0.3

vendor:powerdnsmodel:powerdnsscope:eqversion:3.1.7

Trust: 0.3

vendor:powerdnsmodel:powerdnsscope:eqversion:3.1.6

Trust: 0.3

vendor:powerdnsmodel:powerdnsscope:eqversion:3.1.5

Trust: 0.3

vendor:powerdnsmodel:powerdnsscope:eqversion:3.1.4

Trust: 0.3

vendor:powerdnsmodel:powerdnsscope:eqversion:3.1.3

Trust: 0.3

vendor:powerdnsmodel:powerdnsscope:eqversion:3.1.2

Trust: 0.3

vendor:powerdnsmodel:powerdnsscope:eqversion:3.1.1

Trust: 0.3

vendor:powerdnsmodel:powerdnsscope:eqversion:3.0.1

Trust: 0.3

vendor:powerdnsmodel:powerdnsscope:eqversion:3.0

Trust: 0.3

vendor:powerdnsmodel:powerdnsscope:eqversion:3.1

Trust: 0.3

vendor:gentoomodel:linuxscope: - version: -

Trust: 0.3

vendor:debianmodel:linux sparcscope:eqversion:5.0

Trust: 0.3

vendor:debianmodel:linux s/390scope:eqversion:5.0

Trust: 0.3

vendor:debianmodel:linux powerpcscope:eqversion:5.0

Trust: 0.3

vendor:debianmodel:linux mipselscope:eqversion:5.0

Trust: 0.3

vendor:debianmodel:linux mipsscope:eqversion:5.0

Trust: 0.3

vendor:debianmodel:linux m68kscope:eqversion:5.0

Trust: 0.3

vendor:debianmodel:linux ia-64scope:eqversion:5.0

Trust: 0.3

vendor:debianmodel:linux ia-32scope:eqversion:5.0

Trust: 0.3

vendor:debianmodel:linux hppascope:eqversion:5.0

Trust: 0.3

vendor:debianmodel:linux armelscope:eqversion:5.0

Trust: 0.3

vendor:debianmodel:linux armscope:eqversion:5.0

Trust: 0.3

vendor:debianmodel:linux amd64scope:eqversion:5.0

Trust: 0.3

vendor:debianmodel:linux alphascope:eqversion:5.0

Trust: 0.3

vendor:debianmodel:linuxscope:eqversion:5.0

Trust: 0.3

vendor:debianmodel:linux sparcscope:eqversion:4.0

Trust: 0.3

vendor:debianmodel:linux s/390scope:eqversion:4.0

Trust: 0.3

vendor:debianmodel:linux powerpcscope:eqversion:4.0

Trust: 0.3

vendor:debianmodel:linux mipselscope:eqversion:4.0

Trust: 0.3

vendor:debianmodel:linux mipsscope:eqversion:4.0

Trust: 0.3

vendor:debianmodel:linux m68kscope:eqversion:4.0

Trust: 0.3

vendor:debianmodel:linux ia-64scope:eqversion:4.0

Trust: 0.3

vendor:debianmodel:linux ia-32scope:eqversion:4.0

Trust: 0.3

vendor:debianmodel:linux hppascope:eqversion:4.0

Trust: 0.3

vendor:debianmodel:linux armelscope:eqversion:4.0

Trust: 0.3

vendor:debianmodel:linux armscope:eqversion:4.0

Trust: 0.3

vendor:debianmodel:linux amd64scope:eqversion:4.0

Trust: 0.3

vendor:debianmodel:linux alphascope:eqversion:4.0

Trust: 0.3

vendor:debianmodel:linuxscope:eqversion:4.0

Trust: 0.3

vendor:powerdnsmodel:powerdnsscope:neversion:3.1.7.2

Trust: 0.3

sources: CNVD: CNVD-2010-5502 // BID: 37653 // JVNDB: JVNDB-2010-005035 // CNNVD: CNNVD-201001-052 // NVD: CVE-2009-4010

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2009-4010
value: HIGH

Trust: 1.0

NVD: CVE-2009-4010
value: HIGH

Trust: 0.8

CNVD: CNVD-2010-5502
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201001-052
value: HIGH

Trust: 0.6

nvd@nist.gov: CVE-2009-4010
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2010-5502
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

sources: CNVD: CNVD-2010-5502 // JVNDB: JVNDB-2010-005035 // CNNVD: CNNVD-201001-052 // NVD: CVE-2009-4010

PROBLEMTYPE DATA

problemtype:NVD-CWE-noinfo

Trust: 1.0

sources: NVD: CVE-2009-4010

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201001-052

TYPE

lack of information

Trust: 0.6

sources: CNNVD: CNNVD-201001-052

CONFIGURATIONS

sources: JVNDB: JVNDB-2010-005035

PATCH

title:PowerDNS Security Advisory 2010-02url:http://doc.powerdns.com/powerdns-advisory-2010-02.html

Trust: 0.8

title:PowerDNS Recursor Remote Cache Patch for Vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/37391

Trust: 0.6

sources: CNVD: CNVD-2010-5502 // JVNDB: JVNDB-2010-005035

EXTERNAL IDS

db:NVDid:CVE-2009-4010

Trust: 3.6

db:BIDid:37653

Trust: 2.5

db:SECUNIAid:38068

Trust: 1.7

db:SECUNIAid:38004

Trust: 1.7

db:SECTRACKid:1023404

Trust: 1.6

db:VUPENid:ADV-2010-0054

Trust: 1.6

db:JVNDBid:JVNDB-2010-005035

Trust: 0.8

db:CNVDid:CNVD-2010-5502

Trust: 0.6

db:XFid:55439

Trust: 0.6

db:NSFOCUSid:14304

Trust: 0.6

db:FEDORAid:FEDORA-2010-0209

Trust: 0.6

db:FEDORAid:FEDORA-2010-0228

Trust: 0.6

db:BUGTRAQid:20100106 CRITICAL POWERDNS RECURSOR SECURITY VULNERABILITIES: PLEASE UPGRADE ASAP TO 3.1.7.2

Trust: 0.6

db:CNNVDid:CNNVD-201001-052

Trust: 0.6

db:PACKETSTORMid:85750

Trust: 0.1

db:PACKETSTORMid:85262

Trust: 0.1

db:PACKETSTORMid:85277

Trust: 0.1

db:PACKETSTORMid:129691

Trust: 0.1

db:PACKETSTORMid:84957

Trust: 0.1

sources: CNVD: CNVD-2010-5502 // BID: 37653 // JVNDB: JVNDB-2010-005035 // PACKETSTORM: 85750 // PACKETSTORM: 85262 // PACKETSTORM: 85277 // PACKETSTORM: 129691 // PACKETSTORM: 84957 // CNNVD: CNNVD-201001-052 // NVD: CVE-2009-4010

REFERENCES

url:http://www.securityfocus.com/bid/37653

Trust: 2.2

url:http://doc.powerdns.com/powerdns-advisory-2010-02.html

Trust: 2.0

url:https://www.redhat.com/archives/fedora-package-announce/2010-january/msg00228.html

Trust: 1.7

url:https://www.redhat.com/archives/fedora-package-announce/2010-january/msg00217.html

Trust: 1.7

url:http://www.vupen.com/english/advisories/2010/0054

Trust: 1.6

url:https://bugzilla.redhat.com/show_bug.cgi?id=552285

Trust: 1.6

url:http://securitytracker.com/id?1023404

Trust: 1.6

url:http://secunia.com/advisories/38068

Trust: 1.6

url:http://secunia.com/advisories/38004

Trust: 1.6

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/55439

Trust: 1.0

url:http://www.securityfocus.com/archive/1/508743/100/0/threaded

Trust: 1.0

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-4010

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2009-4010

Trust: 0.8

url:http://xforce.iss.net/xforce/xfdb/55439

Trust: 0.6

url:http://www.securityfocus.com/archive/1/archive/1/508743/100/0/threaded

Trust: 0.6

url:http://www.nsfocus.net/vulndb/14304

Trust: 0.6

url:http://www.powerdns.com/

Trust: 0.3

url:/archive/1/508743

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2009-4010

Trust: 0.3

url:http://packages.debian.org/<pkg>

Trust: 0.2

url:http://security.debian.org/

Trust: 0.2

url:http://www.debian.org/security/faq

Trust: 0.2

url:http://www.debian.org/security/

Trust: 0.2

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.2

url:http://secunia.com/advisories/38004/

Trust: 0.2

url:http://secunia.com/vulnerability_scanning/

Trust: 0.2

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.2

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2009-4009

Trust: 0.2

url:http://security.debian.org/pool/updates/main/p/pdns-recursor/pdns-recursor_3.1.4+v3.1.7-0+etch1_i386.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/pdns-recursor/pdns-recursor_3.1.4+v3.1.7-0+etch1_powerpc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/pdns-recursor/pdns-recursor_3.1.4+v3.1.7-0+etch1_alpha.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/pdns-recursor/pdns-recursor_3.1.4+v3.1.7-0+etch1_s390.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/pdns-recursor/pdns-recursor_3.1.4+v3.1.7-0+etch1_ia64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/pdns-recursor/pdns-recursor_3.1.4+v3.1.7.orig.tar.gz

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/pdns-recursor/pdns-recursor_3.1.4+v3.1.7-0+etch1.diff.gz

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/pdns-recursor/pdns-recursor_3.1.4+v3.1.7-0+etch1.dsc

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/pdns-recursor/pdns-recursor_3.1.4+v3.1.7-0+etch1_amd64.deb

Trust: 0.1

url:http://secunia.com/advisories/38068/

Trust: 0.1

url:http://doc.powerdns.com/powerdns-advisory-2010-01.html

Trust: 0.1

url:http://www.powerdns.com/en/downloads.aspx

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-4009

Trust: 0.1

url:http://creativecommons.org/licenses/by-sa/2.5

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-1193

Trust: 0.1

url:http://security.gentoo.org/glsa/glsa-201412-33.xml

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-1193

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-8601

Trust: 0.1

url:http://security.gentoo.org/

Trust: 0.1

url:http://blog.powerdns.com/2014/02/06/related-to-recent-dos-attacks-recurso=

Trust: 0.1

url:https://bugs.gentoo.org.

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-4010

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-8601

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/pdns-recursor/pdns-recursor_3.1.7.orig.tar.gz

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/pdns-recursor/pdns-recursor_3.1.7-1+lenny1_amd64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/pdns-recursor/pdns-recursor_3.1.7-1+lenny1_powerpc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/pdns-recursor/pdns-recursor_3.1.7-1+lenny1_s390.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/pdns-recursor/pdns-recursor_3.1.7-1+lenny1_alpha.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/pdns-recursor/pdns-recursor_3.1.7-1+lenny1.dsc

Trust: 0.1

url:http://secunia.com/

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/pdns-recursor/pdns-recursor_3.1.7-1+lenny1_ia64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/pdns-recursor/pdns-recursor_3.1.7-1+lenny1.diff.gz

Trust: 0.1

url:http://lists.grok.org.uk/full-disclosure-charter.html

Trust: 0.1

url:http://security.debian.org/pool/updates/main/p/pdns-recursor/pdns-recursor_3.1.7-1+lenny1_i386.deb

Trust: 0.1

sources: CNVD: CNVD-2010-5502 // BID: 37653 // JVNDB: JVNDB-2010-005035 // PACKETSTORM: 85750 // PACKETSTORM: 85262 // PACKETSTORM: 85277 // PACKETSTORM: 129691 // PACKETSTORM: 84957 // CNNVD: CNNVD-201001-052 // NVD: CVE-2009-4010

CREDITS

bert hubert bert.hubert@netherlabs.nl

Trust: 0.6

sources: CNNVD: CNNVD-201001-052

SOURCES

db:CNVDid:CNVD-2010-5502
db:BIDid:37653
db:JVNDBid:JVNDB-2010-005035
db:PACKETSTORMid:85750
db:PACKETSTORMid:85262
db:PACKETSTORMid:85277
db:PACKETSTORMid:129691
db:PACKETSTORMid:84957
db:CNNVDid:CNNVD-201001-052
db:NVDid:CVE-2009-4010

LAST UPDATE DATE

2024-11-23T21:02:58.576000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2010-5502date:2010-01-08T00:00:00
db:BIDid:37653date:2015-04-13T21:54:00
db:JVNDBid:JVNDB-2010-005035date:2012-12-20T00:00:00
db:CNNVDid:CNNVD-201001-052date:2010-01-11T00:00:00
db:NVDid:CVE-2009-4010date:2024-11-21T01:08:43.723

SOURCES RELEASE DATE

db:CNVDid:CNVD-2010-5502date:2010-01-08T00:00:00
db:BIDid:37653date:2010-01-06T00:00:00
db:JVNDBid:JVNDB-2010-005035date:2012-12-20T00:00:00
db:PACKETSTORMid:85750date:2010-01-29T23:33:09
db:PACKETSTORMid:85262date:2010-01-17T12:52:23
db:PACKETSTORMid:85277date:2010-01-17T15:18:58
db:PACKETSTORMid:129691date:2014-12-23T15:40:47
db:PACKETSTORMid:84957date:2010-01-09T01:45:26
db:CNNVDid:CNNVD-201001-052date:2010-01-08T00:00:00
db:NVDid:CVE-2009-4010date:2010-01-08T17:30:02.287