]> granicus.if.org Git - pdns/commitdiff
Add PowerDNS Advisory 2018-02 for CVE-2018-1046 in dnsreplay
authorRemi Gacogne <remi.gacogne@powerdns.com>
Tue, 8 May 2018 13:14:16 +0000 (15:14 +0200)
committerRemi Gacogne <remi.gacogne@powerdns.com>
Tue, 8 May 2018 13:14:16 +0000 (15:14 +0200)
docs/security-advisories/powerdns-advisory-2018-02.rst [new file with mode: 0644]

diff --git a/docs/security-advisories/powerdns-advisory-2018-02.rst b/docs/security-advisories/powerdns-advisory-2018-02.rst
new file mode 100644 (file)
index 0000000..e5bc51c
--- /dev/null
@@ -0,0 +1,26 @@
+PowerDNS Security Advisory 2018-02: Buffer overflow in dnsreplay
+================================================================
+
+-  CVE: CVE-2018-1046
+-  Date: May 8th 2018
+-  Credit: Wei Hao
+-  Affects: dnsreplay from 4.0.0 up to and including 4.1.1
+-  Not affected: dnsreplay 3.4.11, 4.1.2
+-  Severity: High
+-  Impact: Arbitrary code execution
+-  Exploit: This problem can be triggered via a crafted PCAP file
+-  Risk of system compromise: No
+-  Solution: Upgrade to a non-affected version
+
+An issue has been found in the dnsreplay tool provided with PowerDNS
+Authoritative, where replaying a specially crafted PCAP file can trigger a
+stack-based buffer overflow, leading to a crash and potentially arbitrary code
+execution. This buffer overflow only occurs when the `--ecs-stamp` option of
+dnsreplay is used. Regardless of this issue, the use of dnsreplay with
+untrusted PCAP files is not advised.
+This issue has been assigned CVE-2018-1046 by Red Hat.
+
+PowerDNS Authoritative from 4.0.0 up to and including 4.1.0 is affected.
+
+We would like to thank Wei Hao for finding and subsequently reporting
+this issue.