CVE-2017-15093

NameCVE-2017-15093
DescriptionWhen api-config-dir is set to a non-empty value, which is not the case by default, the API in PowerDNS Recursor 4.x up to and including 4.0.6 and 3.x up to and including 3.7.4 allows an authorized user to update the Recursor's ACL by adding and removing netmasks, and to configure forward zones. It was discovered that the new netmask and IP addresses of forwarded zones were not sufficiently validated, allowing an authenticated user to inject new configuration directives into the Recursor's configuration.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
pdns-recursor (PTS)bullseye4.4.2-3fixed
bookworm, bookworm (security)4.8.8-1fixed
trixie5.0.9-1fixed
sid5.1.3-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
pdns-recursorsourcewheezy(not affected)
pdns-recursorsourcejessie3.6.2-2+deb8u4
pdns-recursorsourcestretch4.0.4-1+deb9u2
pdns-recursorsource(unstable)4.0.7-1

Notes

[wheezy] - pdns-recursor <not-affected> (Vulnerable code introduced later)
https://doc.powerdns.com/recursor/security-advisories/powerdns-advisory-2017-06.html
https://downloads.powerdns.com/patches/2017-06/

Search for package or bug name: Reporting problems