Vulnerability Details CVE-2018-10851
PowerDNS Authoritative Server 3.3.0 up to 4.1.4 excluding 4.1.5 and 4.0.6, and PowerDNS Recursor 3.2 up to 4.1.4 excluding 4.1.5 and 4.0.9, are vulnerable to a memory leak while parsing malformed records that can lead to remote denial of service.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.001
EPSS Ranking 18.7%
CVSS Severity
CVSS v3 Score 5.3
CVSS v2 Score 5.0
Products affected by CVE-2018-10851
-
cpe:2.3:a:powerdns:authoritative:3.3
-
cpe:2.3:a:powerdns:authoritative:3.3.1
-
cpe:2.3:a:powerdns:authoritative:3.3.2
-
cpe:2.3:a:powerdns:authoritative:3.3.3
-
cpe:2.3:a:powerdns:authoritative:3.4.0
-
cpe:2.3:a:powerdns:authoritative:3.4.1
-
cpe:2.3:a:powerdns:authoritative:3.4.10
-
cpe:2.3:a:powerdns:authoritative:3.4.11
-
cpe:2.3:a:powerdns:authoritative:3.4.2
-
cpe:2.3:a:powerdns:authoritative:3.4.3
-
cpe:2.3:a:powerdns:authoritative:3.4.4
-
cpe:2.3:a:powerdns:authoritative:3.4.5
-
cpe:2.3:a:powerdns:authoritative:3.4.6
-
cpe:2.3:a:powerdns:authoritative:3.4.7
-
cpe:2.3:a:powerdns:authoritative:3.4.8
-
cpe:2.3:a:powerdns:authoritative:3.4.9
-
cpe:2.3:a:powerdns:authoritative:3.5
-
cpe:2.3:a:powerdns:authoritative:3.5.1
-
cpe:2.3:a:powerdns:authoritative:3.5.2
-
cpe:2.3:a:powerdns:authoritative:3.5.3
-
cpe:2.3:a:powerdns:authoritative:3.6.0
-
cpe:2.3:a:powerdns:authoritative:3.6.1
-
cpe:2.3:a:powerdns:authoritative:3.6.2
-
cpe:2.3:a:powerdns:authoritative:3.6.3
-
cpe:2.3:a:powerdns:authoritative:3.6.4
-
cpe:2.3:a:powerdns:authoritative:3.7.0
-
cpe:2.3:a:powerdns:authoritative:3.7.1
-
cpe:2.3:a:powerdns:authoritative:3.7.2
-
cpe:2.3:a:powerdns:authoritative:3.7.3
-
cpe:2.3:a:powerdns:authoritative:3.7.4
-
cpe:2.3:a:powerdns:authoritative:4.0.0
-
cpe:2.3:a:powerdns:authoritative:4.0.1
-
cpe:2.3:a:powerdns:authoritative:4.0.2
-
cpe:2.3:a:powerdns:authoritative:4.0.3
-
cpe:2.3:a:powerdns:authoritative:4.0.4
-
cpe:2.3:a:powerdns:authoritative:4.0.5
-
cpe:2.3:a:powerdns:authoritative:4.0.6
-
cpe:2.3:a:powerdns:authoritative:4.0.7
-
cpe:2.3:a:powerdns:authoritative:4.0.8
-
cpe:2.3:a:powerdns:authoritative:4.1.0
-
cpe:2.3:a:powerdns:authoritative:4.1.1
-
cpe:2.3:a:powerdns:authoritative:4.1.2
-
cpe:2.3:a:powerdns:authoritative:4.1.3
-
cpe:2.3:a:powerdns:authoritative:4.1.4
-
cpe:2.3:a:powerdns:recursor:3.2
-
cpe:2.3:a:powerdns:recursor:3.3
-
cpe:2.3:a:powerdns:recursor:3.3.1
-
cpe:2.3:a:powerdns:recursor:3.5
-
cpe:2.3:a:powerdns:recursor:3.5.1
-
cpe:2.3:a:powerdns:recursor:3.5.2
-
cpe:2.3:a:powerdns:recursor:3.5.3
-
cpe:2.3:a:powerdns:recursor:3.6.0
-
cpe:2.3:a:powerdns:recursor:3.6.1
-
cpe:2.3:a:powerdns:recursor:3.6.2
-
cpe:2.3:a:powerdns:recursor:3.6.3
-
cpe:2.3:a:powerdns:recursor:3.6.4
-
cpe:2.3:a:powerdns:recursor:3.7.0
-
cpe:2.3:a:powerdns:recursor:3.7.1
-
cpe:2.3:a:powerdns:recursor:3.7.2
-
cpe:2.3:a:powerdns:recursor:3.7.3
-
cpe:2.3:a:powerdns:recursor:3.7.4
-
cpe:2.3:a:powerdns:recursor:4.0.0
-
cpe:2.3:a:powerdns:recursor:4.0.1
-
cpe:2.3:a:powerdns:recursor:4.0.2
-
cpe:2.3:a:powerdns:recursor:4.0.3
-
cpe:2.3:a:powerdns:recursor:4.0.4
-
cpe:2.3:a:powerdns:recursor:4.0.5
-
cpe:2.3:a:powerdns:recursor:4.0.6
-
cpe:2.3:a:powerdns:recursor:4.0.7
-
cpe:2.3:a:powerdns:recursor:4.0.8
-
cpe:2.3:a:powerdns:recursor:4.1.0
-
cpe:2.3:a:powerdns:recursor:4.1.1
-
cpe:2.3:a:powerdns:recursor:4.1.2
-
cpe:2.3:a:powerdns:recursor:4.1.3
-
cpe:2.3:a:powerdns:recursor:4.1.4