Upstream information

CVE-2017-15093 at MITRE

Description

When api-config-dir is set to a non-empty value, which is not the case by default, the API in PowerDNS Recursor 4.x up to and including 4.0.6 and 3.x up to and including 3.7.4 allows an authorized user to update the Recursor's ACL by adding and removing netmasks, and to configure forward zones. It was discovered that the new netmask and IP addresses of forwarded zones were not sufficiently validated, allowing an authenticated user to inject new configuration directives into the Recursor's configuration.

SUSE information

Overall state of this security issue: Does not affect SUSE products

This issue is currently rated as having moderate severity.

CVSS v2 Scores
  National Vulnerability Database
Base Score 3.5
Vector AV:N/AC:M/Au:S/C:N/I:P/A:N
Access Vector Network
Access Complexity Medium
Authentication Single
Confidentiality Impact None
Integrity Impact Partial
Availability Impact None
SUSE Bugzilla entry: 1069242 [RESOLVED / FIXED]

SUSE Security Advisories:

List of released packages

Product(s) Fixed package version(s) References
openSUSE Leap 42.2
  • pdns-recursor >= 3.7.3-9.3.1
  • pdns-recursor-debuginfo >= 3.7.3-9.3.1
  • pdns-recursor-debugsource >= 3.7.3-9.3.1
Patchnames:
openSUSE-2017-1339
openSUSE Leap 42.3
  • pdns-recursor >= 4.0.5-3.1
  • pdns-recursor-debuginfo >= 4.0.5-3.1
  • pdns-recursor-debugsource >= 4.0.5-3.1
Patchnames:
openSUSE-2017-1339