From: Remi Gacogne Date: Tue, 8 May 2018 13:14:16 +0000 (+0200) Subject: Add PowerDNS Advisory 2018-02 for CVE-2018-1046 in dnsreplay X-Git-Tag: dnsdist-1.3.1~112^2~1 X-Git-Url: https://granicus.if.org/sourcecode?a=commitdiff_plain;h=95a6d1d55c6764bb15f628bca4226661128af165;p=pdns Add PowerDNS Advisory 2018-02 for CVE-2018-1046 in dnsreplay --- diff --git a/docs/security-advisories/powerdns-advisory-2018-02.rst b/docs/security-advisories/powerdns-advisory-2018-02.rst new file mode 100644 index 000000000..e5bc51cc0 --- /dev/null +++ b/docs/security-advisories/powerdns-advisory-2018-02.rst @@ -0,0 +1,26 @@ +PowerDNS Security Advisory 2018-02: Buffer overflow in dnsreplay +================================================================ + +- CVE: CVE-2018-1046 +- Date: May 8th 2018 +- Credit: Wei Hao +- Affects: dnsreplay from 4.0.0 up to and including 4.1.1 +- Not affected: dnsreplay 3.4.11, 4.1.2 +- Severity: High +- Impact: Arbitrary code execution +- Exploit: This problem can be triggered via a crafted PCAP file +- Risk of system compromise: No +- Solution: Upgrade to a non-affected version + +An issue has been found in the dnsreplay tool provided with PowerDNS +Authoritative, where replaying a specially crafted PCAP file can trigger a +stack-based buffer overflow, leading to a crash and potentially arbitrary code +execution. This buffer overflow only occurs when the `--ecs-stamp` option of +dnsreplay is used. Regardless of this issue, the use of dnsreplay with +untrusted PCAP files is not advised. +This issue has been assigned CVE-2018-1046 by Red Hat. + +PowerDNS Authoritative from 4.0.0 up to and including 4.1.0 is affected. + +We would like to thank Wei Hao for finding and subsequently reporting +this issue.