Bug 1109231 - pdns: DoS due to maximum number of file descriptors exhausted
Summary: pdns: DoS due to maximum number of file descriptors exhausted
Keywords:
Status: CLOSED ERRATA
Alias: None
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1109232 1109233 1109234 1109235 1109236 1109237 1109239
Blocks:
TreeView+ depends on / blocked
 
Reported: 2014-06-13 13:13 UTC by Vasyl Kaigorodov
Modified: 2023-09-25 05:53 UTC (History)
3 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2014-06-13 16:57:48 UTC
Embargoed:


Attachments (Terms of Use)

Description Vasyl Kaigorodov 2014-06-13 13:13:34 UTC
It was found [1] that in default configuration PowerDNS is allowed to consume more file descriptors than is available for a default Linux installation.
This can potentially lead to the DoS attack.
Patch is available at [2]

External references:

  [1]: http://blog.powerdns.com/2014/02/06/related-to-recent-dos-attacks-recursor-configuration-file-guidance/
  [2]: https://github.com/Habbie/pdns/commit/e24b124a4c7b49f38ff8bcf6926cd69077d16ad8

Comment 2 Peter van Dijk (PowerDNS) 2014-06-13 14:03:52 UTC
As upstream developer, I confirm that this bug is only present in the Recursor ('pdns-recursor'), not in the Authoritative server ('pdns').

Comment 3 Vincent Danen 2014-06-13 16:57:48 UTC
Thanks for this, Peter, and the links to the fixed packages.


Note You need to log in before you can comment on or make changes to this bug.