PowerDNS: Denial of Service
Gentoo Linux Security Advisory
||GLSA 201202-04 / pdns
||February 22, 2012
||February 22, 2012: 1
All supported architectures
A vulnerability in PowerDNS could allow a remote attacker to create
a Denial of Service condition.
The PowerDNS nameserver is an authoritative-only nameserver which uses a
flexible backend architecture.
A vulnerability has been found in PowerDNS which could cause a packet
loop of DNS responses.
A remote attacker could send specially crafted DNS response packets,
possibly resulting in a Denial of Service condition.
PowerDNS users can set "cache-ttl=0" in /etc/powerdns/pdns.conf and then
restart the PowerDNS daemon:
Code Listing 3.1: Workaround
# /etc/init.d/pdns restart
Please review the PowerDNS Security Advisory below for more workaround
All PowerDNS users should upgrade to the latest version:
Code Listing 3.2: Resolution
# emerge --sync
# emerge --ask --oneshot --verbose ">=net-dns/pdns-3.0.1"