{"id":"MGASA-2018-0255","summary":"Updated pdns packages fix security vulnerability","details":"A stack-based buffer overflow in the dnsreplay tool occurring when\nreplaying a specially crafted PCAP file with the `--ecs-stamp` option\nenabled, leading to a denial of service or potentially arbitrary code\nexecution (CVE-2018-1046).\n","modified":"2026-02-04T02:41:32.630264Z","published":"2018-05-24T16:30:31Z","related":["CVE-2018-1046"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2018-0255.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=23009"},{"type":"REPORT","url":"http://openwall.com/lists/oss-security/2018/05/09/2"},{"type":"REPORT","url":"https://doc.powerdns.com/authoritative/security-advisories/powerdns-advisory-2018-02.html"},{"type":"REPORT","url":"https://blog.powerdns.com/2018/05/08/authoritative-server-4-1-2-released/"}],"affected":[{"package":{"name":"pdns","ecosystem":"Mageia:6","purl":"pkg:rpm/mageia/pdns?arch=source&distro=mageia-6"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.1.2-1.mga6"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2018-0255.json"}}],"schema_version":"1.7.3","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}