Free and open-source vulnerability scanner
Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.
Install NowAvailable for macOS, Windows, and Linux
Debian Security Advisory DSA 771-1 (pdns)
Information
Severity
Severity
Family
Family
CVSSv2 Base
CVSSv2 Base
CVSSv2 Vector
CVSSv2 Vector
Solution Type
Solution Type
Created
Created
Modified
Modified
Summary
The remote host is missing an update to pdns announced via advisory DSA 771-1. Several problems have been discovered in pdns, a versatile nameserver that can lead to a denial of service. The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2005-2301 Norbert Sendetzky and Jan de Groot discoverd that the LDAP backend did not properly escape all queries, allowing it to fail and not answer queries anymore. CVE-2005-2302 Wilco Baan discovered that queries from clients without recursion permission can temporarily blank out domains to clients with recursion permitted. This enables outside users to blank out a domain temporarily to normal users. The old stable distribution (woody) does not contain pdns packages.
Solution
Solution
For the stable distribution (sarge) these problems have been fixed in version 2.9.17-13sarge1. For the unstable distribution (sid) these problems have been fixed in version 2.9.18-1. We recommend that you upgrade your pdns package. https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20771-1