{"id":"CVE-2023-26437","details":"Denial of service vulnerability in PowerDNS Recursor allows authoritative servers to be marked unavailable.This issue affects Recursor: through 4.6.5, through 4.7.4 , through 4.8.3.","modified":"2026-04-10T04:56:21.942497Z","published":"2023-04-04T15:15:08.880Z","related":["openSUSE-SU-2023:0101-1","openSUSE-SU-2024:0048-1","openSUSE-SU-2024:12838-1"],"references":[{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IHPD6SIQOG7245GXFQHPUEI4AZ6Y3KD6/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CN7VMRYKZHG2UDUAK326LXD3JY7NO3LR/"},{"type":"ADVISORY","url":"https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2023-02.html"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/powerdns/pdns","events":[{"introduced":"0"},{"fixed":"cbbfb4f0012eae11d015a5982e53601ac523fa90"},{"introduced":"677a4e8ea8f791d27d2a75c1f3e6486dff11e22f"},{"fixed":"21b255f57931de7c69a0c3b7f4e7e0adb7f50dc3"},{"introduced":"84bc8944539bb9082312c703fb19775ffabc79f9"},{"fixed":"566ad636d52331435705fb3a9c876966e53a4d9d"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"4.6.6"},{"introduced":"4.7.0"},{"fixed":"4.7.5"},{"introduced":"4.8.0"},{"fixed":"4.8.4"}]}}],"versions":["auth-3.1-rc1","auth-3.1-rc2","auth-3.1-rc3","auth-3.2-rc1","auth-3.2-rc2","auth-3.2-rc3","auth-3.2-rc4","auth-3.4.0","auth-3.4.0-rc1","auth-3.4.0-rc2","auth-4.0.0","auth-4.0.0-alpha1","auth-4.0.0-alpha2","auth-4.0.0-alpha3","auth-4.0.0-beta1","auth-4.0.0-rc1","auth-4.0.0-rc2","auth-4.0.1","auth-4.1.0","auth-4.1.0-rc1","auth-4.1.0-rc2","auth-4.1.0-rc3","auth-4.2.0-alpha1","auth-4.2.0-beta1","auth-4.2.0-rc1","auth-4.2.0-rc2","auth-4.3.0-alpha1","auth-4.3.0-beta1","auth-4.3.0-beta2","auth-4.4.0-alpha0","auth-4.4.0-alpha1","auth-4.4.0-alpha2","auth-4.4.0-alpha3","auth-4.4.0-beta1","auth-4.5.0-alpha0","auth-4.5.0-alpha1","auth-4.5.0-beta1","auth-4.6.0-alpha0","auth-4.6.0-alpha1","dnsdist-1.0.0","dnsdist-1.0.0-alpha1","dnsdist-1.0.0-alpha2","dnsdist-1.0.0-beta1","dnsdist-1.1.0","dnsdist-1.1.0-beta1","dnsdist-1.1.0-beta2","dnsdist-1.2.0","dnsdist-1.3.0","dnsdist-1.3.1","dnsdist-1.3.2","dnsdist-1.3.3","dnsdist-1.4.0","dnsdist-1.4.0-alpha1","dnsdist-1.4.0-alpha2","dnsdist-1.4.0-beta1","dnsdist-1.4.0-rc1","dnsdist-1.4.0-rc2","dnsdist-1.4.0-rc3","dnsdist-1.4.0-rc4","dnsdist-1.4.0-rc5","dnsdist-1.5.0","dnsdist-1.5.0-alpha1","dnsdist-1.5.0-rc1","dnsdist-1.5.0-rc2","dnsdist-1.5.0-rc3","dnsdist-1.5.0-rc4","dnsdist-1.6.0","dnsdist-1.6.0-alpha0","dnsdist-1.6.0-alpha1","dnsdist-1.6.0-alpha2","dnsdist-1.6.0-alpha3","dnsdist-1.6.0-rc1","dnsdist-1.6.0-rc2","dnsdist-1.7.0-alpha0","dnsdist-1.7.0-alpha1","dnsdist-1.7.0-alpha2","dnsdist-1.7.0-beta1","rec-3-0","rec-3-0-1","rec-3.0","rec-3.0.1","rec-3.1.4","rec-3.3.1","rec-3.5","rec-3.5-rc1","rec-3.5-rc3","rec-3.5-rc4","rec-3.5-rc5","rec-3.6.0","rec-4.0.0","rec-4.0.0-alpha1","rec-4.0.0-alpha2","rec-4.0.0-alpha3","rec-4.0.0-beta1","rec-4.0.0-rc1","rec-4.0.1","rec-4.0.2","rec-4.1.0","rec-4.1.0-alpha1","rec-4.1.0-rc1","rec-4.1.0-rc2","rec-4.1.0-rc3","rec-4.2.0-alpha1","rec-4.2.0-beta1","rec-4.2.0-rc1","rec-4.3.0-alpha1","rec-4.3.0-alpha2","rec-4.3.0-alpha3","rec-4.3.0-beta1","rec-4.4.0-alpha0","rec-4.4.0-alpha1","rec-4.4.0-alpha2","rec-4.4.0-beta1","rec-4.5.0-alpha0","rec-4.5.0-alpha1","rec-4.5.0-alpha2","rec-4.5.0-alpha3","rec-4.5.0-beta1","rec-4.6.0","rec-4.6.0-alpha0","rec-4.6.0-alpha1","rec-4.6.0-alpha2","rec-4.6.0-beta1","rec-4.6.0-beta2","rec-4.6.0-rc1","rec-4.6.2","rec-4.6.3","rec-4.6.4","rec-4.6.5","rec-4.7.0","rec-4.7.1","rec-4.7.2","rec-4.7.3","rec-4.7.4","rec-4.8.0","rec-4.8.2","rec-4.8.3"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-26437.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}]}