CVE-2019-10163

A Vulnerability has been found in PowerDNS Authoritative Server before versions 4.1.9, 4.0.8 allowing a remote, authorized master server to cause a high CPU load or even prevent any further updates to any slave zone by sending a large number of NOTIFY messages. Note that only servers configured as slaves are affected by this issue.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:powerdns:authoritative:*:*:*:*:*:*:*:*
cpe:2.3:a:powerdns:authoritative:*:*:*:*:*:*:*:*
cpe:2.3:a:powerdns:authoritative:4.1.0:-:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:opensuse:backports:sle-15:-:*:*:*:*:*:*
cpe:2.3:o:opensuse:backports:sle-15:sp1:*:*:*:*:*:*
cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*

History

03 Feb 2023, 14:27

Type Values Removed Values Added
First Time Opensuse backports
CPE cpe:2.3:o:opensuse:backports:sle-15:sp1:*:*:*:*:*:*
cpe:2.3:o:opensuse:backports:sle-15:-:*:*:*:*:*:*

Information

Published : 2019-07-30 23:15

Updated : 2023-12-10 12:59


NVD link : CVE-2019-10163

Mitre link : CVE-2019-10163

CVE.ORG link : CVE-2019-10163


JSON object : View

Products Affected

opensuse

  • leap
  • backports

powerdns

  • authoritative
CWE
CWE-770

Allocation of Resources Without Limits or Throttling