{"id":"CVE-2018-10851","details":"PowerDNS Authoritative Server 3.3.0 up to 4.1.4 excluding 4.1.5 and 4.0.6, and PowerDNS Recursor 3.2 up to 4.1.4 excluding 4.1.5 and 4.0.9, are vulnerable to a memory leak while parsing malformed records that can lead to remote denial of service.","modified":"2026-03-14T09:26:00.184314Z","published":"2018-11-29T18:29:00.303Z","related":["MGASA-2019-0008","MGASA-2019-0009","SUSE-RU-2019:0863-1","SUSE-SU-2019:0863-1","SUSE-SU-2020:1066-1","openSUSE-SU-2018:4062-1","openSUSE-SU-2018:4073-1","openSUSE-SU-2018:4175-1","openSUSE-SU-2018:4177-1","openSUSE-SU-2024:11156-1","openSUSE-SU-2024:11157-1"],"references":[{"type":"ADVISORY","url":"https://doc.powerdns.com/authoritative/security-advisories/powerdns-advisory-2018-03.html"},{"type":"ADVISORY","url":"https://doc.powerdns.com/recursor/security-advisories/powerdns-advisory-2018-04.html"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10851"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/powerdns/pdns","events":[{"introduced":"018b331fd5059ccf9028d95a29d90f623da7dd1d"},{"last_affected":"0a98a51fb1fbf90922f2edf7e47f3a9a050e2ddf"},{"introduced":"ded69cde032b74b1e64f1a4b6b21993c075c7aee"},{"last_affected":"0a98a51fb1fbf90922f2edf7e47f3a9a050e2ddf"}],"database_specific":{"versions":[{"introduced":"3.3"},{"last_affected":"4.1.4"},{"introduced":"3.2"},{"last_affected":"4.1.4"}]}}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2018-10851.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}