UBUNTU-CVE-2019-3871

See a problem?
Source
https://ubuntu.com/security/notices/UBUNTU-CVE-2019-3871
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-3871.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2019-3871
Related
Published
2019-03-21T21:29:00Z
Modified
2019-03-21T21:29:00Z
Severity
  • 8.8 (High) CVSS_V3 - CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

A vulnerability was found in PowerDNS Authoritative Server before 4.0.7 and before 4.1.7. An insufficient validation of data coming from the user when building a HTTP request from a DNS query in the HTTP Connector of the Remote backend, allowing a remote user to cause a denial of service by making the server connect to an invalid endpoint, or possibly information disclosure by making the server connect to an internal endpoint and somehow extracting meaningful information about the response

References

Affected packages

Ubuntu:Pro:16.04:LTS / pdns

Package

Name
pdns

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

3.*

3.4.5-1build2
3.4.6-2
3.4.6-3
3.4.7-1
3.4.7-2

4.*

4.0.0~alpha1-1
4.0.0~alpha2-2
4.0.0~alpha2-3
4.0.0~alpha2-3build1

Ecosystem specific

{
    "ubuntu_priority": "medium"
}

Ubuntu:Pro:18.04:LTS / pdns

Package

Name
pdns

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

4.*

4.0.4-2
4.0.4-2build1
4.0.5-1
4.1.0-1
4.1.0-2
4.1.0-2build1
4.1.1-1

Ecosystem specific

{
    "ubuntu_priority": "medium"
}

Ubuntu:20.04:LTS / pdns

Package

Name
pdns
Purl
pkg:deb/ubuntu/pdns@4.1.6-3build1?arch=src?distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.1.6-3build1

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "medium",
    "binaries": [
        {
            "pdns-backend-geoip": "4.1.6-3build1",
            "pdns-backend-pgsql": "4.1.6-3build1",
            "pdns-backend-pipe": "4.1.6-3build1",
            "pdns-backend-sqlite3-dbgsym": "4.1.6-3build1",
            "pdns-backend-opendbx-dbgsym": "4.1.6-3build1",
            "pdns-server": "4.1.6-3build1",
            "pdns-backend-odbc": "4.1.6-3build1",
            "pdns-backend-lua-dbgsym": "4.1.6-3build1",
            "pdns-server-dbgsym": "4.1.6-3build1",
            "pdns-backend-mysql-dbgsym": "4.1.6-3build1",
            "pdns-backend-opendbx": "4.1.6-3build1",
            "pdns-backend-sqlite3": "4.1.6-3build1",
            "pdns-backend-pipe-dbgsym": "4.1.6-3build1",
            "pdns-backend-pgsql-dbgsym": "4.1.6-3build1",
            "pdns-backend-remote": "4.1.6-3build1",
            "pdns-backend-tinydns-dbgsym": "4.1.6-3build1",
            "pdns-backend-ldap": "4.1.6-3build1",
            "pdns-backend-odbc-dbgsym": "4.1.6-3build1",
            "pdns-backend-bind-dbgsym": "4.1.6-3build1",
            "pdns-tools-dbgsym": "4.1.6-3build1",
            "pdns-backend-lua": "4.1.6-3build1",
            "pdns-backend-tinydns": "4.1.6-3build1",
            "pdns-backend-geoip-dbgsym": "4.1.6-3build1",
            "pdns-backend-mydns-dbgsym": "4.1.6-3build1",
            "pdns-backend-remote-dbgsym": "4.1.6-3build1",
            "pdns-backend-ldap-dbgsym": "4.1.6-3build1",
            "pdns-backend-mysql": "4.1.6-3build1",
            "pdns-backend-mydns": "4.1.6-3build1",
            "pdns-tools": "4.1.6-3build1",
            "pdns-backend-bind": "4.1.6-3build1"
        }
    ]
}