Critical security update for PowerDNS Recursor
PowerDNS has released PowerDNS Recursor version 3.1.7.2 to close two holes in the company's open source recursive DNS resolver. A critical flaw (CVE-2009-4009) allowed specially crafted packets to force a buffer overflow in Recursor which could lead to a crash and reportedly a possible full system compromise.
A high severity flaw (CVE-2009-4010) involves using specially crafted zones which could fool the PowerDNS Recursor into accepting bogus data which could allow an attacker to, for example, "drive data from bigbank.com to an IP address of his choosing". According to the release notes, all known versions of the PowerDNS Recursor are impacted to some extent and the developers advise an immediate update. The developers point out that the PowerDNS authoritative server is not affected by these issues.
Version 3.1.7.2 is already being distributed as s security update by, among others, Fedora and Ubuntu. Updated binaries and source code of the GPL licensed PowerDNS Recursor are available to download.
See also:
- PowerDNS Security Advisory 2010-01: PowerDNS Recursor up to and including 3.1.7.1 can be brought down and probably exploited
- PowerDNS Security Advisory 2010-02: PowerDNS Recursor up to and including 3.1.7.1 can be spoofed into accepting bogus data
(djwm)