[Frugalware-security] [ FSA-49 ] pdns-recursor

voroskoi noreply at frugalware.org
Thu Nov 23 17:32:49 CET 2006


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Frugalware Security Advisory                           FSA-49

Date: 2006-11-23
Package: pdns-recursor
Vulnerable versions: <= 3.1.2-1
Unaffected versions: >= 3.1.4-1siwenna1
Related bugreport: http://bugs.frugalware.org/task/1454
CVE: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4251
			http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4252

Description
===========

Two vulnerabilities have been reported in PowerDNS Recursor, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system.
1) An error in length calculation when handling TCP DNS queries can be exploited to cause an overly large copy via a specially crafted packet. Successful exploitation may allow execution of arbitrary code.
2) An error in the handling CNAME records can be exploited to crash the service.

Updated Packages
================

Check if you have pdns-recursor installed:

	# pacman -Q pdns-recursor

If found, then you should upgrade to the latest version:

	# pacman -Sy pdns-recursor

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (GNU/Linux)
Comment: See http://ftp.frugalware.org/pub/README.GPG for info

iD8DBQFFZc0xZ7NElSD1VhkRAhqGAJwLgKNe62KPzMQSlZIJcrIwROje2QCcDCZz
MqnVerkLISqUrN8MqKz+pCk=
=cT4w
-----END PGP SIGNATURE-----


More information about the Frugalware-security mailing list