{
  "schema_version": "1.6.2",
  "id": "MGASA-2017-0033",
  "published": "2017-02-02T08:11:52Z",
  "modified": "2017-02-02T08:02:23Z",
  "summary": "Updated pdns packages fix security vulnerabilities",
  "details": "Mathieu Lafon discovered that pdns does not properly validate records\nin zones. An authorized user can take advantage of this flaw to crash\nserver by inserting a specially crafted record in a zone under their\ncontrol and then sending a DNS query for that record (CVE-2016-2120).\n\nFlorian Heinz and Martin Kluge reported that pdns parses all records\npresent in a query regardless of whether they are needed or even\nlegitimate, allowing a remote, unauthenticated attacker to cause an\nabnormal CPU usage load on the pdns server, resulting in a partial\ndenial of service if the system becomes overloaded (CVE-2016-7068).\n\nMongo discovered that the webserver in pdns is susceptible to a\ndenial-of-service vulnerability. A remote, unauthenticated attacker to\ncause a denial of service by opening a large number of f TCP\nconnections to the web server (CVE-2016-7072).\n\nMongo discovered that pdns does not sufficiently validate TSIG\nsignatures, allowing an attacker in position of man-in-the-middle to\nalter the content of an AXFR (CVE-2016-7073, CVE-2016-7074).\n",
  "related": [
    "CVE-2016-2120",
    "CVE-2016-7068",
    "CVE-2016-7072",
    "CVE-2016-7073",
    "CVE-2016-7074"
  ],
  "references": [
    {
      "type": "ADVISORY",
      "url": "https://advisories.mageia.org/MGASA-2017-0033.html"
    },
    {
      "type": "REPORT",
      "url": "https://bugs.mageia.org/show_bug.cgi?id=20126"
    },
    {
      "type": "REPORT",
      "url": "https://doc.powerdns.com/md/security/powerdns-advisory-2016-02/"
    },
    {
      "type": "REPORT",
      "url": "https://doc.powerdns.com/md/security/powerdns-advisory-2016-03/"
    },
    {
      "type": "REPORT",
      "url": "https://doc.powerdns.com/md/security/powerdns-advisory-2016-04/"
    },
    {
      "type": "REPORT",
      "url": "https://doc.powerdns.com/md/security/powerdns-advisory-2016-05/"
    },
    {
      "type": "REPORT",
      "url": "https://www.debian.org/security/2017/dsa-3764"
    }
  ],
  "affected": [
    {
      "package": {
        "ecosystem": "Mageia:5",
        "name": "pdns",
        "purl": "pkg:rpm/mageia/pdns?arch=source&distro=mageia-5"
      },
      "ranges": [
        {
          "type": "ECOSYSTEM",
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "3.3.3-1.3.mga5"
            }
          ]
        }
      ],
      "ecosystem_specific": {
        "section": "core"
      }
    }
  ],
  "credits": [
    {
      "name": "Mageia",
      "type": "COORDINATOR",
      "contact": [
        "https://wiki.mageia.org/en/Packages_Security_Team"
      ]
    }
  ]
}
