Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2021-36754Improper Restriction of Operations within the Bounds of a Memory Buffer in Authoritative Server

Severity
7.5HIGHNVD
EPSS
81.3%
top 0.83%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedJul 30
Latest updateMay 24

Description

PowerDNS Authoritative Server 4.5.0 before 4.5.1 allows anybody to crash the process by sending a specific query (QTYPE 65535) that causes an out-of-bounds exception.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6

Affected Packages1 packages

NVDpowerdns/authoritative_server4.5.04.5.1

🔴Vulnerability Details

4
GHSA
GHSA-g5x7-wx2c-jqff: PowerDNS Authoritative Server 42022-05-24
OSV
CVE-2021-36754: PowerDNS Authoritative Server 42021-07-30
CVEList
CVE-2021-36754: PowerDNS Authoritative Server 42021-07-27
VulnCheck
powerdns authoritative_server Improper Restriction of Operations within the Bounds of a Memory Buffer2021

💥Exploits & PoCs

1
Nuclei
PowerDNS Authoritative Server - Denial of Service

📋Vendor Advisories

1
Debian
CVE-2021-36754: pdns - PowerDNS Authoritative Server 4.5.0 before 4.5.1 allows anybody to crash the pro...2021
CVE-2021-36754 — Authoritative Server vulnerability | cvebase