{"id":"CVE-2018-14626","details":"PowerDNS Authoritative Server 4.1.0 up to 4.1.4 inclusive and PowerDNS Recursor 4.0.0 up to 4.1.4 inclusive are vulnerable to a packet cache pollution via crafted query that can lead to denial of service.","modified":"2026-03-15T14:29:27.591500Z","published":"2018-11-29T18:29:00.477Z","related":["MGASA-2019-0008","MGASA-2019-0009","SUSE-RU-2019:0863-1","SUSE-SU-2019:0863-1","SUSE-SU-2020:1066-1","openSUSE-SU-2018:4062-1","openSUSE-SU-2018:4073-1","openSUSE-SU-2018:4175-1","openSUSE-SU-2018:4177-1","openSUSE-SU-2024:11156-1","openSUSE-SU-2024:11157-1"],"references":[{"type":"ADVISORY","url":"https://doc.powerdns.com/authoritative/security-advisories/powerdns-advisory-2018-05.html"},{"type":"ADVISORY","url":"https://doc.powerdns.com/recursor/security-advisories/powerdns-advisory-2018-06.html"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14626"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/powerdns/pdns","events":[{"introduced":"80da1b4773cbdad76755b01c70739059d6f607af"},{"last_affected":"0a98a51fb1fbf90922f2edf7e47f3a9a050e2ddf"},{"introduced":"ba64cecd417688dc39c75e92f1a23b91f7f46d64"},{"last_affected":"0a98a51fb1fbf90922f2edf7e47f3a9a050e2ddf"}],"database_specific":{"versions":[{"introduced":"4.1.0"},{"last_affected":"4.1.4"},{"introduced":"4.0.0"},{"last_affected":"4.1.4"}]}}],"versions":["rec-4.1.0","rec-4.1.1","rec-4.1.2","rec-4.1.3","rec-4.1.4"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2018-14626.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}