Vulnerability Details : CVE-2009-4009
Buffer overflow in PowerDNS Recursor before 3.1.7.2 allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via crafted packets.
Vulnerability category: OverflowExecute codeDenial of service
Threat overview for CVE-2009-4009
Top countries where our scanners detected CVE-2009-4009
Top open port discovered on systems with this issue
53
IPs affected by CVE-2009-4009 18
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2009-4009!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2009-4009
Probability of exploitation activity in the next 30 days: 4.08%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 91 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2009-4009
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
10.0
|
HIGH | AV:N/AC:L/Au:N/C:C/I:C/A:C |
10.0
|
10.0
|
NIST |
CWE ids for CVE-2009-4009
-
The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.Assigned by: nvd@nist.gov (Primary)
References for CVE-2009-4009
-
http://doc.powerdns.com/powerdns-advisory-2010-01.html
-
http://www.vupen.com/english/advisories/2010/0054
Vendor Advisory
- https://www.redhat.com/archives/fedora-package-announce/2010-January/msg00228.html
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/55438
- https://www.redhat.com/archives/fedora-package-announce/2010-January/msg00217.html
- http://www.securityfocus.com/archive/1/508743/100/0/threaded
- https://bugzilla.redhat.com/show_bug.cgi?id=552285
-
http://securitytracker.com/id?1023403
-
http://www.securityfocus.com/bid/37650
Patch
Products affected by CVE-2009-4009
- cpe:2.3:a:powerdns:recursor:*:*:*:*:*:*:*:*
- cpe:2.3:a:powerdns:recursor:3.0:*:*:*:*:*:*:*
- cpe:2.3:a:powerdns:recursor:3.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:powerdns:recursor:2.9.15:*:*:*:*:*:*:*
- cpe:2.3:a:powerdns:recursor:2.9.16:*:*:*:*:*:*:*
- cpe:2.3:a:powerdns:recursor:3.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:powerdns:recursor:2.0_rc1:*:*:*:*:*:*:*
- cpe:2.3:a:powerdns:recursor:2.8:*:*:*:*:*:*:*
- cpe:2.3:a:powerdns:recursor:3.1:*:*:*:*:*:*:*
- cpe:2.3:a:powerdns:recursor:3.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:powerdns:recursor:2.9.17:*:*:*:*:*:*:*
- cpe:2.3:a:powerdns:recursor:2.9.18:*:*:*:*:*:*:*
- cpe:2.3:a:powerdns:recursor:3.1.3:*:*:*:*:*:*:*
- cpe:2.3:a:powerdns:recursor:3.1.4:*:*:*:*:*:*:*
- cpe:2.3:a:powerdns:recursor:3.1.7.1:*:*:*:*:*:*:*
- cpe:2.3:a:powerdns:recursor:3.1.7:*:*:*:*:*:*:*
- cpe:2.3:a:powerdns:recursor:3.1.5:*:*:*:*:*:*:*
- cpe:2.3:a:powerdns:recursor:3.1.6:*:*:*:*:*:*:*