A vulnerability has been found in PowerDNS Authoritative Server before versions 4.1.10, 4.0.8 allowing an authorized user to cause the server to exit by inserting a crafted record in a MASTER type zone under their control. The issue is due to the fact that the Authoritative Server will exit when it runs into a parsing error while looking up the NS/A/AAAA records it is about to use for an outgoing notify.
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "pdns-backend-geoip": "4.1.6-3build1", "pdns-backend-pgsql": "4.1.6-3build1", "pdns-backend-pipe": "4.1.6-3build1", "pdns-backend-sqlite3-dbgsym": "4.1.6-3build1", "pdns-backend-opendbx-dbgsym": "4.1.6-3build1", "pdns-server": "4.1.6-3build1", "pdns-backend-odbc": "4.1.6-3build1", "pdns-backend-lua-dbgsym": "4.1.6-3build1", "pdns-server-dbgsym": "4.1.6-3build1", "pdns-backend-mysql-dbgsym": "4.1.6-3build1", "pdns-backend-opendbx": "4.1.6-3build1", "pdns-backend-sqlite3": "4.1.6-3build1", "pdns-backend-pipe-dbgsym": "4.1.6-3build1", "pdns-backend-pgsql-dbgsym": "4.1.6-3build1", "pdns-backend-remote": "4.1.6-3build1", "pdns-backend-tinydns-dbgsym": "4.1.6-3build1", "pdns-backend-ldap": "4.1.6-3build1", "pdns-backend-odbc-dbgsym": "4.1.6-3build1", "pdns-backend-bind-dbgsym": "4.1.6-3build1", "pdns-tools-dbgsym": "4.1.6-3build1", "pdns-backend-lua": "4.1.6-3build1", "pdns-backend-tinydns": "4.1.6-3build1", "pdns-backend-geoip-dbgsym": "4.1.6-3build1", "pdns-backend-mydns-dbgsym": "4.1.6-3build1", "pdns-backend-remote-dbgsym": "4.1.6-3build1", "pdns-backend-ldap-dbgsym": "4.1.6-3build1", "pdns-backend-mysql": "4.1.6-3build1", "pdns-backend-mydns": "4.1.6-3build1", "pdns-tools": "4.1.6-3build1", "pdns-backend-bind": "4.1.6-3build1" } ] }