CVE-2015-5230Improper Input Validation in Authoritative

Severity
7.5HIGHNVD
EPSS
0.2%
top 60.66%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJan 15
Latest updateMay 24

Description

The DNS packet parsing/generation code in PowerDNS (aka pdns) Authoritative Server 3.4.x before 3.4.6 allows remote attackers to cause a denial of service (crash) via crafted query packets.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6

Affected Packages3 packages

CVEListV5powerdns/powerdns_authoritative_server3.4.x before 3.4.6
NVDpowerdns/authoritative3.4.03.4.6
Debianopen-xchange/pdns< 3.4.6-1+3

Also affects: Debian Linux 8.0, 9.0

🔴Vulnerability Details

3
GHSA
GHSA-q4mr-9hrx-q3wc: The DNS packet parsing/generation code in PowerDNS (aka pdns) Authoritative Server 32022-05-24
CVEList
CVE-2015-5230: The DNS packet parsing/generation code in PowerDNS (aka pdns) Authoritative Server 32020-01-15
OSV
CVE-2015-5230: The DNS packet parsing/generation code in PowerDNS (aka pdns) Authoritative Server 32020-01-15

📋Vendor Advisories

1
Debian
CVE-2015-5230: pdns - The DNS packet parsing/generation code in PowerDNS (aka pdns) Authoritative Serv...2015

💬Community

2
Bugzilla
CVE-2015-5230 pdns: denial of service due to memory leak in exception handling routines [fedora-all]2015-09-03
Bugzilla
CVE-2015-5230 pdns: denial of service due to memory leak in exception handling routines2015-08-26
CVE-2015-5230 — Improper Input Validation | cvebase