Previous topic

PowerDNS Security Advisory 2008-01: System random generator can be predicted, leading to the potential to ‘spoof’ PowerDNS Recursor

Next topic

PowerDNS Security Advisory 2010-02: PowerDNS Recursor up to and including 3.1.7.1 can be spoofed into accepting bogus data

This Page

PowerDNS Security Advisory 2010-01: PowerDNS Recursor up to and including 3.1.7.1 can be brought down and probably exploited

  • CVE: CVE-2009-4009
  • Date: 6th of January 2010
  • Affects: PowerDNS Recursor 3.1.7.1 and earlier
  • Not affected: No versions of the PowerDNS Authoritative (‘pdns_server’) are affected.
  • Severity: Critical
  • Impact: Denial of Service, possible full system compromise
  • Exploit: Withheld
  • Solution: Upgrade to PowerDNS Recursor 3.1.7.2 or higher
  • Workaround: None. The risk of exploitation or denial of service can be decreased slightly by using the allow-from setting to only provide service to known users. The risk of a full system compromise can be reduced by running with a suitable reduced privilege user and group settings, and possibly chroot environment.

Using specially crafted packets, it is possible to force a buffer overflow in the PowerDNS Recursor, leading to a crash.

This vulnerability was discovered by a third party that (for now) prefers not to be named. PowerDNS is very grateful however for their help in improving PowerDNS security.