The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.

computer vulnerability bulletin CVE-2018-16855

PowerDNS Recursor: out-of-bounds memory reading via Cache Lookup Hash

Synthesis of the vulnerability

An attacker can force a read at an invalid address via Cache Lookup Hash of PowerDNS Recursor, in order to trigger a denial of service, or to obtain sensitive information.
Vulnerable systems: openSUSE Leap, SUSE Linux Enterprise Desktop, SLES.
Severity of this threat: 2/4.
Consequences of a hack: data reading, denial of service on service.
Pirate's origin: intranet client.
Creation date: 11/12/2018.
Références of this weakness: CVE-2018-16855, openSUSE-SU-2018:4062-1, openSUSE-SU-2018:4152-1, openSUSE-SU-2018:4177-1, VIGILANCE-VUL-27998.

Description of the vulnerability

An attacker can force a read at an invalid address via Cache Lookup Hash of PowerDNS Recursor, in order to trigger a denial of service, or to obtain sensitive information.
Full Vigil@nce bulletin... (Free trial)

Computer vulnerabilities tracking service

Vigil@nce provides a network vulnerability alert. The Vigil@nce security watch publishes vulnerability bulletins about threats impacting the information system. The technology watch team tracks security threats targeting the computer system. The Vigil@nce vulnerability database contains several thousand vulnerabilities.