|
|
| |
| arpwatch is prone to a remote security-bypass vulnerability. |
| |
Credit:
The original article can be found at: http://www.securityfocus.com/bid/54157
The information has been provided by David Black.
|
| |
Vulnerable Systems:
* Red Hat Fedora 17
* Red Hat Fedora 16
* Red Hat Fedora 15
* PowerDNS PowerDNS 3.1.7
* PowerDNS PowerDNS 3.1.6
* PowerDNS PowerDNS 3.1.5
* PowerDNS PowerDNS 3.1.4
* PowerDNS PowerDNS 3.1.3
* PowerDNS PowerDNS 3.1.2
* PowerDNS PowerDNS 3.1.1
* PowerDNS PowerDNS 3.0.1
* PowerDNS PowerDNS 3.0
* PowerDNS PowerDNS 2.9.21 .2
* PowerDNS PowerDNS 2.9.21 .1
* PowerDNS PowerDNS 2.9.21
* PowerDNS PowerDNS 2.9.20
* PowerDNS PowerDNS 2.9.19
* PowerDNS PowerDNS 2.9.18
* PowerDNS PowerDNS 2.9.17
* PowerDNS PowerDNS 2.9.16
* PowerDNS PowerDNS 2.9.15
* PowerDNS PowerDNS 3.1
An attacker can exploit this issue to bypass certain security restrictions and perform unauthorized actions.
Vendor Status:
Vendor as issued an update for this vulnerablity.
Patch Availability:
http://www.powerdns.com/content/downloads.html
CVE Information:
CVE-2012-2653
Disclosure Timeline:
Published: May 25 2012
Updated: Jun 22 2012
|
|
blog comments powered by
|