{"id":"MGASA-2016-0324","summary":"Updated pdns packages fix security vulnerability","details":"PowerDNS Authoritative Server accepts queries with a qname's length larger\nthan 255 bytes (CVE-2016-5426). PowerDNS Authoritative Server does not\nproperly handle dot inside labels (CVE-2016-5427). These issues allow a\nremote, unauthenticated attacker to cause an abnormal load on the PowerDNS\nbackend by sending crafted DNS queries, which might result in a partial\ndenial of service if the backend becomes overloaded.\n\nIt was found that PowerDNS does not implement reasonable restrictions for\nzone sizes. This allows an explicitly configured primary DNS server for a\nzone to crash a secondary DNS server, affecting service of other zones\nhosted on the same secondary server (CVE-2016-6172).\n","modified":"2026-04-16T06:25:05.717996401Z","published":"2016-09-28T05:59:24Z","upstream":["CVE-2016-5426","CVE-2016-5427","CVE-2016-6172"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2016-0324.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=19166"},{"type":"WEB","url":"https://doc.powerdns.com/md/security/powerdns-advisory-2016-01/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/WTT7ILQWU5FKY4GLFZV4V7B4VEUXETKL/"},{"type":"WEB","url":"http://lwn.net/Vulnerabilities/700386/"},{"type":"WEB","url":"https://www.debian.org/security/2016/dsa-3664"}],"affected":[{"package":{"name":"pdns","ecosystem":"Mageia:5","purl":"pkg:rpm/mageia/pdns?arch=source&distro=mageia-5"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3.3.3-1.2.mga5"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2016-0324.json"}}],"schema_version":"1.7.5","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}