DEBIAN-CVE-2019-3871

Source
https://security-tracker.debian.org/tracker/DEBIAN-CVE-2019-3871
Import Source
https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2019-3871.json
JSON Data
https://api.test.osv.dev/v1/vulns/DEBIAN-CVE-2019-3871
Upstream
Published
2019-03-21T21:29:00Z
Modified
2025-09-19T06:03:18Z
Summary
[none]
Details

A vulnerability was found in PowerDNS Authoritative Server before 4.0.7 and before 4.1.7. An insufficient validation of data coming from the user when building a HTTP request from a DNS query in the HTTP Connector of the Remote backend, allowing a remote user to cause a denial of service by making the server connect to an invalid endpoint, or possibly information disclosure by making the server connect to an internal endpoint and somehow extracting meaningful information about the response

References

Affected packages

Debian:11 / pdns

Package

Name
pdns
Purl
pkg:deb/debian/pdns?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.1.6-2

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / pdns

Package

Name
pdns
Purl
pkg:deb/debian/pdns?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.1.6-2

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / pdns

Package

Name
pdns
Purl
pkg:deb/debian/pdns?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.1.6-2

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:14 / pdns

Package

Name
pdns
Purl
pkg:deb/debian/pdns?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.1.6-2

Ecosystem specific

{
    "urgency": "not yet assigned"
}