A vulnerability was found in PowerDNS Authoritative Server before 4.0.7 and before 4.1.7. An insufficient validation of data coming from the user when building a HTTP request from a DNS query in the HTTP Connector of the Remote backend, allowing a remote user to cause a denial of service by making the server connect to an invalid endpoint, or possibly information disclosure by making the server connect to an internal endpoint and somehow extracting meaningful information about the response
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
http://www.openwall.com/lists/oss-security/2019/03/18/4 | patch mailing list exploit third party advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3871 | patch exploit third party advisory issue tracking |
https://doc.powerdns.com/authoritative/security-advisories/powerdns-advisory-2019-03.html | vendor advisory |
http://www.securityfocus.com/bid/107491 | third party advisory vdb entry |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GWUHF6MRSQ3YO7UUISGLV7MXCAGBW2VD/ | vendor advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ROFI6OTWF4GKONNSNEDUCW6LVSSEBZNF/ | vendor advisory |
https://lists.debian.org/debian-lts-announce/2019/03/msg00039.html | mailing list |
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00022.html | vendor advisory |
https://www.debian.org/security/2019/dsa-4424 | vendor advisory |
https://seclists.org/bugtraq/2019/Apr/8 | mailing list |