Vulnerability Name:

CVE-2009-4009 (CCN-55438)

Assigned:2009-11-19
Published:2010-01-06
Updated:2018-10-10
Summary:Buffer overflow in PowerDNS Recursor before 3.1.7.2 allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via crafted packets.
CVSS v3 Severity:7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): Low
CVSS v2 Severity:10.0 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C)
7.4 High (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
6.8 Medium (CCN CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P)
5.0 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
Vulnerability Type:CWE-119
Vulnerability Consequences:Gain Access
References:Source: MITRE
Type: CNA
CVE-2009-4009

Source: CCN
Type: PowerDNS Security Advisory 2010-01
PowerDNS Recursor up to and including 3.1.7.1 can be brought down and probably exploited

Source: CONFIRM
Type: UNKNOWN
http://doc.powerdns.com/powerdns-advisory-2010-01.html

Source: CCN
Type: SA38004
PowerDNS Recursor Spoofing and Buffer Overflow Vulnerabilities

Source: SECUNIA
Type: UNKNOWN
38004

Source: SECUNIA
Type: Vendor Advisory
38068

Source: CCN
Type: SECTRACK ID: 1023403
PowerDNS Recursor Buffer Overflow May Let Remote Users Execute Arbitrary Code

Source: SECTRACK
Type: UNKNOWN
1023403

Source: DEBIAN
Type: DSA-1968
pdns-recursor -- several vulnerabilities

Source: CCN
Type: OSVDB ID: 61602
PowerDNS Recursor Crafted Packet Handling Unspecified Overflow

Source: BUGTRAQ
Type: UNKNOWN
20100106 Critical PowerDNS Recursor Security Vulnerabilities: please upgrade ASAP to 3.1.7.2

Source: BID
Type: Patch
37650

Source: CCN
Type: BID-37650
PowerDNS Recurser Buffer Overflow Vulnerability

Source: VUPEN
Type: Vendor Advisory
ADV-2010-0054

Source: CONFIRM
Type: UNKNOWN
https://bugzilla.redhat.com/show_bug.cgi?id=552285

Source: XF
Type: UNKNOWN
powerdns-unspecified-bo(55438)

Source: XF
Type: UNKNOWN
powerdns-unspecified-bo(55438)

Source: FEDORA
Type: UNKNOWN
FEDORA-2010-0209

Source: FEDORA
Type: UNKNOWN
FEDORA-2010-0228

Source: SUSE
Type: SUSE-SR:2010:004
SUSE Security Summary Report

Vulnerable Configuration:Configuration 1:
  • cpe:/a:powerdns:recursor:2.0_rc1:*:*:*:*:*:*:*
  • OR cpe:/a:powerdns:recursor:2.8:*:*:*:*:*:*:*
  • OR cpe:/a:powerdns:recursor:2.9.15:*:*:*:*:*:*:*
  • OR cpe:/a:powerdns:recursor:2.9.16:*:*:*:*:*:*:*
  • OR cpe:/a:powerdns:recursor:2.9.17:*:*:*:*:*:*:*
  • OR cpe:/a:powerdns:recursor:2.9.18:*:*:*:*:*:*:*
  • OR cpe:/a:powerdns:recursor:3.0:*:*:*:*:*:*:*
  • OR cpe:/a:powerdns:recursor:3.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:powerdns:recursor:3.1:*:*:*:*:*:*:*
  • OR cpe:/a:powerdns:recursor:3.1.1:*:*:*:*:*:*:*
  • OR cpe:/a:powerdns:recursor:3.1.2:*:*:*:*:*:*:*
  • OR cpe:/a:powerdns:recursor:3.1.3:*:*:*:*:*:*:*
  • OR cpe:/a:powerdns:recursor:3.1.4:*:*:*:*:*:*:*
  • OR cpe:/a:powerdns:recursor:3.1.5:*:*:*:*:*:*:*
  • OR cpe:/a:powerdns:recursor:3.1.6:*:*:*:*:*:*:*
  • OR cpe:/a:powerdns:recursor:3.1.7:*:*:*:*:*:*:*
  • OR cpe:/a:powerdns:recursor:3.1.7.1:*:*:*:*:*:*:*
  • OR cpe:/a:powerdns:recursor:*:*:*:*:*:*:*:* (Version <= 3.1.7.2)

  • Configuration CCN 1:
  • cpe:/a:powerdns:recursor:3.1.7.1:*:*:*:*:*:*:*
  • AND
  • cpe:/o:debian:debian_linux:5.0:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:20094009
    V
    CVE-2009-4009
    2022-06-30
    oval:org.opensuse.security:def:113103
    P
    pdns-recursor-4.0.3-1.2 on GA media (Moderate)
    2022-01-17
    oval:org.opensuse.security:def:106538
    P
    pdns-recursor-4.0.3-1.2 on GA media (Moderate)
    2021-10-01
    oval:org.mitre.oval:def:7153
    P
    DSA-1968 pdns-recursor -- several vulnerabilities
    2014-06-23
    oval:org.mitre.oval:def:12888
    P
    DSA-1968-1 pdns-recursor -- several
    2014-06-23
    oval:org.mitre.oval:def:13457
    P
    DSA-1968-2 pdns-recursor -- DNS cache poisoning
    2014-06-23
    oval:org.debian:def:1968
    V
    several vulnerabilities
    2010-01-08
    BACK
    powerdns recursor 2.0_rc1
    powerdns recursor 2.8
    powerdns recursor 2.9.15
    powerdns recursor 2.9.16
    powerdns recursor 2.9.17
    powerdns recursor 2.9.18
    powerdns recursor 3.0
    powerdns recursor 3.0.1
    powerdns recursor 3.1
    powerdns recursor 3.1.1
    powerdns recursor 3.1.2
    powerdns recursor 3.1.3
    powerdns recursor 3.1.4
    powerdns recursor 3.1.5
    powerdns recursor 3.1.6
    powerdns recursor 3.1.7
    powerdns recursor 3.1.7.1
    powerdns recursor *
    powerdns recursor 3.1.7.1
    debian debian linux 5.0