CVE-2009-4009
Published Jan 8, 2010
Last updated 6 years ago
Overview
- Description
- Buffer overflow in PowerDNS Recursor before 3.1.7.2 allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via crafted packets.
- Source
- cve@mitre.org
- NVD status
- Modified
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 10
- Impact score
- 10
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:C/I:C/A:C
Weaknesses
- nvd@nist.gov
- CWE-119
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:powerdns:recursor:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E8F4B452-AA57-4D2A-B757-7B4F7C712CB6", "versionEndIncluding": "3.1.7.2" }, { "criteria": "cpe:2.3:a:powerdns:recursor:2.0_rc1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E02559EA-6C7F-4328-A435-B4F69E640645" }, { "criteria": "cpe:2.3:a:powerdns:recursor:2.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D390616D-8CAB-46D3-864D-09AF99E3A407" }, { "criteria": "cpe:2.3:a:powerdns:recursor:2.9.15:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "47DFAA6A-CA5B-4B2A-BFC2-A0DF85BF68D8" }, { "criteria": "cpe:2.3:a:powerdns:recursor:2.9.16:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "306EBF4B-2292-4B14-9835-9FD0E82FE7CC" }, { "criteria": "cpe:2.3:a:powerdns:recursor:2.9.17:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3A31C83E-8A81-4483-A245-FD1C08684183" }, { "criteria": "cpe:2.3:a:powerdns:recursor:2.9.18:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "44D51FCC-8AD6-4461-8F48-B77EB2693C89" }, { "criteria": "cpe:2.3:a:powerdns:recursor:3.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "38DDFF27-8CBB-468D-9837-C74538E5EF0A" }, { "criteria": "cpe:2.3:a:powerdns:recursor:3.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B3920499-3580-4EA6-AD56-6515C3B8495A" }, { "criteria": "cpe:2.3:a:powerdns:recursor:3.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AF444F17-46F1-4036-B5F1-CA04F7F19684" }, { "criteria": "cpe:2.3:a:powerdns:recursor:3.1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FA1E4934-6690-4A09-8E6E-FE7ED57B9DEE" }, { "criteria": "cpe:2.3:a:powerdns:recursor:3.1.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D474CF9D-1898-46D3-80B1-2D3743265F56" }, { "criteria": "cpe:2.3:a:powerdns:recursor:3.1.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E18F9C22-04BB-4081-89E0-E6989970EBCD" }, { "criteria": "cpe:2.3:a:powerdns:recursor:3.1.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FD3E469E-EAE5-4BF1-BB69-6445FBBF96FF" }, { "criteria": "cpe:2.3:a:powerdns:recursor:3.1.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5333FFD9-9287-4DD8-BD23-5CA3F575313F" }, { "criteria": "cpe:2.3:a:powerdns:recursor:3.1.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5EC1BD97-DB54-48D1-955E-9F935CDE07C9" }, { "criteria": "cpe:2.3:a:powerdns:recursor:3.1.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "82DFE95C-19B3-4F48-AE74-3D884D86D0DE" }, { "criteria": "cpe:2.3:a:powerdns:recursor:3.1.7.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "45D27722-962A-4F0A-AEC0-CDC253F7F857" } ], "operator": "OR" } ] } ]