Upstream information

CVE-2018-16855 at MITRE

Description

An issue has been found in PowerDNS Recursor before version 4.1.8 where a remote attacker sending a DNS query can trigger an out-of-bounds memory read while computing the hash of the query for a packet cache lookup, possibly leading to a crash.

SUSE information

Overall state of this security issue: Does not affect SUSE products

This issue is currently rated as having important severity.

CVSS v2 Scores
  National Vulnerability Database
Base Score 5
Vector AV:N/AC:L/Au:N/C:N/I:N/A:P
Access Vector Network
Access Complexity Low
Authentication None
Confidentiality Impact None
Integrity Impact None
Availability Impact Partial
CVSS v3 Scores
  National Vulnerability Database
Base Score 7.5
Vector AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Access Vector Network
Access Complexity Low
Privileges Required None
User Interaction None
Scope Unchanged
Confidentiality Impact None
Integrity Impact None
Availability Impact High
SUSE Bugzilla entries: 1116591 [RESOLVED / DUPLICATE], 1116592 [RESOLVED / FIXED]

SUSE Security Advisories:

List of released packages

Product(s) Fixed package version(s) References
SUSE Package Hub for SUSE Linux Enterprise 12 SP1
  • pdns-recursor >= 4.1.8-13.1
  • pdns-recursor-debuginfo >= 4.1.8-13.1
  • pdns-recursor-debugsource >= 4.1.8-13.1
Patchnames:
openSUSE-2018-1524
SUSE Package Hub for SUSE Linux Enterprise 15
  • pdns-recursor >= 4.1.2-bp150.2.3.1
Patchnames:
openSUSE-2018-1570
openSUSE Leap 15.0
  • pdns-recursor >= 4.1.2-lp150.2.3.1
  • pdns-recursor-debuginfo >= 4.1.2-lp150.2.3.1
  • pdns-recursor-debugsource >= 4.1.2-lp150.2.3.1
Patchnames:
openSUSE-2018-1565