In association with heise online

07 January 2010, 15:46

Critical security update for PowerDNS Recursor

  • Twitter
  • Facebook
  • submit to slashdot
  • StumbleUpon
  • submit to reddit

PowerDNS has released PowerDNS Recursor version 3.1.7.2 to close two holes in the company's open source recursive DNS resolver. A critical flaw (CVE-2009-4009) allowed specially crafted packets to force a buffer overflow in Recursor which could lead to a crash and reportedly a possible full system compromise.

A high severity flaw (CVE-2009-4010) involves using specially crafted zones which could fool the PowerDNS Recursor into accepting bogus data which could allow an attacker to, for example, "drive data from bigbank.com to an IP address of his choosing". According to the release notes, all known versions of the PowerDNS Recursor are impacted to some extent and the developers advise an immediate update. The developers point out that the PowerDNS authoritative server is not affected by these issues.

Version 3.1.7.2 is already being distributed as s security update by, among others, Fedora and Ubuntu. Updated binaries and source code of the GPL licensed PowerDNS Recursor are available to download.

See also:

(djwm)

Print Version | Send by email | Permalink: http://h-online.com/-898693
 


  • July's Community Calendar





The H Open

The H Security

The H Developer

The H Internet Toolkit