You are here
Home > Preporuke > Sigurnosni nedostatak programskog paketa pdns

Sigurnosni nedostatak programskog paketa pdns

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LDE

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA512

– ————————————————————————-
Debian Security Advisory DSA-4063-1 security@debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
December 11, 2017 https://www.debian.org/security/faq
– ————————————————————————-

Package : pdns-recursor
CVE ID : CVE-2017-15120

Toshifumi Sakaguchi discovered that PowerDNS Recursor, a high-performance
resolving name server was susceptible to denial of service via a crafted
CNAME answer.

The oldstable distribution (jessie) is not affected.

For the stable distribution (stretch), this problem has been fixed in
version 4.0.4-1+deb9u3.

We recommend that you upgrade your pdns-recursor packages.

For the detailed security status of pdns-recursor please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/pdns-recursor

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
—–BEGIN PGP SIGNATURE—–

iQIzBAEBCgAdFiEEtuYvPRKsOElcDakFEMKTtsN8TjYFAlovAGcACgkQEMKTtsN8
TjYaWhAAgRx5y5txLii/bnYXUTayrcWKAgvj9nC/1aGTpQvxpZCAEMOYdrDAdl1F
SaKJM36b7QMdxUp3kIKEJnQfwwGntFs+t7epQ0JOwPJRIE7PY9kXTBtSppAQMzrA
XwlI/nHLhq0QCqHkZ3cilqZWwBvqa+X3rbw+Za5TmAgwX7iaOwib35q6ogtxlSrA
EtlMi1VPdRZD2QyhzGSN7j9qUv9Nebob5d9SNhsl6YC6TPnwuwMIrbtGhaKukuO1
6KrTFETzqIk7ic/uB4xKib4osDl+tsq2SkN/LKuSWNgEUewqxnSdjQ0UmSvA1Dpt
3yA9WSWjf4V7rksO6NMlvdQIeuSHzB+aPP19H6GhLW/IjFMxk2eclCUoTanSjIb9
Zpwuf5XBcQcp2g+hOTLlKWkdPxaE6ssQImVzvLb31pSpDtH/6RsJ9GGDvQ6h2tLo
9xIzR4DZ/K4M7vQ/bku34yVeebeGU6n2V51IZN2eScq2wJJw5Ib5RfNCVvl66pli
9zPmJi2MJ61aNQnueAsMOPNPytFNAkUuui5efPslQY2KS8YJnfmJ+R+teiLDGOqW
jMdwuxo5sA4nr6FDFKHGd+HcdKxBMg81cL7uxlh7x1mJL1ta2B03x4jPBOjiPp1P
QpzwVaajThd3PVBm097eWp7AbooiU8pfgFaxYiMw92Z/ox25FW0=
=T9ea
—–END PGP SIGNATURE—–

AutorDanijel Kozinovic
Cert idNCERT-REF-2017-12-0089-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
Izvorhttp://www.adobe.com/
Top
More in Preporuke
Sigurnosni nedostaci programskog paketa openssl

Otkriveni su sigurnosni nedostaci u programskom paketu openssl za operacijski sustav Ubuntu. Otkriveni nedostaci potencijalnim napadačima omogućuju zaobilaženje sigurnosnih ograničenja...

Close