CVE-2022-27227

In PowerDNS Authoritative Server before 4.4.3, 4.5.x before 4.5.4, and 4.6.x before 4.6.1 and PowerDNS Recursor before 4.4.8, 4.5.x before 4.5.8, and 4.6.x before 4.6.1, insufficient validation of an IXFR end condition causes incomplete zone transfers to be handled as successful transfers.
References
Link Resource
http://www.openwall.com/lists/oss-security/2022/03/25/1 Mailing List Patch Third Party Advisory
https://doc.powerdns.com/authoritative/security-advisories/index.html Vendor Advisory
https://doc.powerdns.com/authoritative/security-advisories/powerdns-advisory-2022-01.html Vendor Advisory
https://docs.powerdns.com/recursor/security-advisories/index.html Vendor Advisory
https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2022-01.html Vendor Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2QKN56VWXUVFOYGUN75N5IRNK66OHTHT/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HEABZA46XYEUWMGSY2GYYVHISBVWEHIO/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IPHOFNI7FKM5NNOVDOWO4TBXFAFICCUE/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZJSKICB67SPPEGNXCQLZVSWR6QGCN3KP/
http://www.openwall.com/lists/oss-security/2022/03/25/1 Mailing List Patch Third Party Advisory
https://doc.powerdns.com/authoritative/security-advisories/index.html Vendor Advisory
https://doc.powerdns.com/authoritative/security-advisories/powerdns-advisory-2022-01.html Vendor Advisory
https://docs.powerdns.com/recursor/security-advisories/index.html Vendor Advisory
https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2022-01.html Vendor Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2QKN56VWXUVFOYGUN75N5IRNK66OHTHT/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HEABZA46XYEUWMGSY2GYYVHISBVWEHIO/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IPHOFNI7FKM5NNOVDOWO4TBXFAFICCUE/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZJSKICB67SPPEGNXCQLZVSWR6QGCN3KP/
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:powerdns:authoritative_server:*:*:*:*:*:*:*:*
cpe:2.3:a:powerdns:authoritative_server:*:*:*:*:*:*:*:*
cpe:2.3:a:powerdns:authoritative_server:*:*:*:*:*:*:*:*
cpe:2.3:a:powerdns:recursor:*:*:*:*:*:*:*:*
cpe:2.3:a:powerdns:recursor:*:*:*:*:*:*:*:*
cpe:2.3:a:powerdns:recursor:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*

History

No history.

Information

Published : 2022-03-25 15:15

Updated : 2024-11-21 06:55


NVD link : CVE-2022-27227

Mitre link : CVE-2022-27227

CVE.ORG link : CVE-2022-27227


JSON object : View

Products Affected

fedoraproject

  • fedora

powerdns

  • recursor
  • authoritative_server