Bug 1579271 (CVE-2018-1046)

Summary: CVE-2018-1046 pdns: Buffer overflow in dnsreplay
Product: [Other] Security Response Reporter: Adam Mariš <amaris>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED NOTABUG QA Contact:
Severity: high Docs Contact:
Priority: high    
Version: unspecifiedCC: ms, ruben, sander
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: pdns 4.1.2 Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2018-05-17 09:34:55 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1579272    
Bug Blocks:    

Description Adam Mariš 2018-05-17 09:34:11 UTC
An issue has been found in the dnsreplay tool provided with PowerDNS Authoritative, where replaying a specially crafted PCAP file can trigger a stack-based buffer overflow, leading to a crash and potentially arbitrary code execution. This buffer overflow only occurs when the –ecs-stamp option of dnsreplay is used.

Affects: dnsreplay from 4.0.0 up to and including 4.1.1

Upstream patch:

https://github.com/PowerDNS/pdns/commit/f9c57c98da1b1007a51680629b667d57d9b702b8

Reference:

https://doc.powerdns.com/authoritative/security-advisories/powerdns-advisory-2018-02.html

Comment 1 Adam Mariš 2018-05-17 09:34:32 UTC
Created pdns tracking bugs for this issue:

Affects: fedora-all [bug 1579272]