Upstream information

CVE-2018-16855 at MITRE

Description

An issue has been found in PowerDNS Recursor before version 4.1.8 where a remote attacker sending a DNS query can trigger an out-of-bounds memory read while computing the hash of the query for a packet cache lookup, possibly leading to a crash.

SUSE information

Overall state of this security issue: Resolved

This issue is currently rated as having important severity.

CVSS v2 Scores
  National Vulnerability Database
Base Score 5
Vector AV:N/AC:L/Au:N/C:N/I:N/A:P
Access Vector Network
Access Complexity Low
Authentication None
Confidentiality Impact None
Integrity Impact None
Availability Impact Partial
CVSS v3 Scores
  National Vulnerability Database
Base Score 7.5
Vector CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Attack Vector Network
Attack Complexity Low
Privileges Required None
User Interaction None
Scope Unchanged
Confidentiality Impact None
Integrity Impact None
Availability Impact High
CVSSv3 Version 3
SUSE Bugzilla entries: 1116591 [RESOLVED / DUPLICATE], 1116592 [RESOLVED / FIXED]

SUSE Security Advisories:

List of released packages

Product(s) Fixed package version(s) References
SUSE Package Hub 12 SP1
  • pdns-recursor >= 4.1.8-13.1
Patchnames:
openSUSE-2018-1524
SUSE Package Hub 15
  • pdns-recursor >= 4.1.2-bp150.2.3.1
Patchnames:
openSUSE-2018-1570
openSUSE Leap 15.0
  • pdns-recursor >= 4.1.2-lp150.2.3.1
Patchnames:
openSUSE-2019-988
openSUSE Tumbleweed
  • pdns-recursor >= 4.5.5-1.3
Patchnames:
openSUSE-Tumbleweed-2024-11157


SUSE Timeline for this CVE

CVE page created: Mon Nov 19 17:25:27 2018
CVE page last modified: Tue Sep 3 19:09:57 2024