PowerDNS Recursor versions prior to 3.6.1 contain a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition.
The vulnerability is due to an error in the recursor implementation. The attacker could exploit this vulnerability by submitting a sequence of malicious packets to the targeted server. Successful exploitation could allow the attacker to cause the server to crash, resulting in a DoS condition.
PowerDNS confirmed the vulnerability and released software updates.
Administrators are advised to apply the appropriate updates.
Administrators are advised to restrict network access to affected systems.
Administrators are advised to monitor affected systems.
PowerDNS has released a security advisory at the following link: PowerDNS Recursor 3.6.1
. PowerDNS has released software updates at the following link: PowerDNS Recursor 3.6.1