<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for pdns</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2017:0183-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2017-01-17T14:22:21Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2017-01-17T14:22:21Z</InitialReleaseDate>
    <CurrentReleaseDate>2017-01-17T14:22:21Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for pdns</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for pdns fixes the following issues:

- CVE-2016-2120: Crafted zone record could have caused a denial of service (bsc#1018329).
- CVE-2016-7068: Crafted queries could have caused abnormal CPU usage (bsc#1018326).
- CVE-2016-7072: Denial of service via the web server (bsc#1018327).
- CVE-2016-7073: Fixed insufficient validation of TSIG signatures (bsc#1018328).
- CVE-2016-7074: Fixed insufficient validation of TSIG signatures ((bsc#1018328).
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/opensuse-updates/2017-01/msg00102.html</URL>
      <Description>E-Mail link for openSUSE-SU-2017:0183-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Leap 42.1">
      <Branch Type="Product Name" Name="openSUSE Leap 42.1">
        <FullProductName ProductID="openSUSE Leap 42.1">openSUSE Leap 42.1</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="openSUSE Leap 42.2">
      <Branch Type="Product Name" Name="openSUSE Leap 42.2">
        <FullProductName ProductID="openSUSE Leap 42.2">openSUSE Leap 42.2</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="pdns-3.4.9-3.1">
      <FullProductName ProductID="pdns-3.4.9-3.1">pdns-3.4.9-3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="pdns-backend-ldap-3.4.9-3.1">
      <FullProductName ProductID="pdns-backend-ldap-3.4.9-3.1">pdns-backend-ldap-3.4.9-3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="pdns-backend-lua-3.4.9-3.1">
      <FullProductName ProductID="pdns-backend-lua-3.4.9-3.1">pdns-backend-lua-3.4.9-3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="pdns-backend-mydns-3.4.9-3.1">
      <FullProductName ProductID="pdns-backend-mydns-3.4.9-3.1">pdns-backend-mydns-3.4.9-3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="pdns-backend-mysql-3.4.9-3.1">
      <FullProductName ProductID="pdns-backend-mysql-3.4.9-3.1">pdns-backend-mysql-3.4.9-3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="pdns-backend-postgresql-3.4.9-3.1">
      <FullProductName ProductID="pdns-backend-postgresql-3.4.9-3.1">pdns-backend-postgresql-3.4.9-3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="pdns-backend-sqlite3-3.4.9-3.1">
      <FullProductName ProductID="pdns-backend-sqlite3-3.4.9-3.1">pdns-backend-sqlite3-3.4.9-3.1</FullProductName>
    </Branch>
    <Relationship ProductReference="pdns-3.4.9-3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:pdns-3.4.9-3.1">pdns-3.4.9-3.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="pdns-backend-ldap-3.4.9-3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:pdns-backend-ldap-3.4.9-3.1">pdns-backend-ldap-3.4.9-3.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="pdns-backend-lua-3.4.9-3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:pdns-backend-lua-3.4.9-3.1">pdns-backend-lua-3.4.9-3.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="pdns-backend-mydns-3.4.9-3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:pdns-backend-mydns-3.4.9-3.1">pdns-backend-mydns-3.4.9-3.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="pdns-backend-mysql-3.4.9-3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:pdns-backend-mysql-3.4.9-3.1">pdns-backend-mysql-3.4.9-3.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="pdns-backend-postgresql-3.4.9-3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:pdns-backend-postgresql-3.4.9-3.1">pdns-backend-postgresql-3.4.9-3.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="pdns-backend-sqlite3-3.4.9-3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:pdns-backend-sqlite3-3.4.9-3.1">pdns-backend-sqlite3-3.4.9-3.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="pdns-3.4.9-3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:pdns-3.4.9-3.1">pdns-3.4.9-3.1 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="pdns-backend-ldap-3.4.9-3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:pdns-backend-ldap-3.4.9-3.1">pdns-backend-ldap-3.4.9-3.1 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="pdns-backend-lua-3.4.9-3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:pdns-backend-lua-3.4.9-3.1">pdns-backend-lua-3.4.9-3.1 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="pdns-backend-mydns-3.4.9-3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:pdns-backend-mydns-3.4.9-3.1">pdns-backend-mydns-3.4.9-3.1 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="pdns-backend-mysql-3.4.9-3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:pdns-backend-mysql-3.4.9-3.1">pdns-backend-mysql-3.4.9-3.1 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="pdns-backend-postgresql-3.4.9-3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:pdns-backend-postgresql-3.4.9-3.1">pdns-backend-postgresql-3.4.9-3.1 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="pdns-backend-sqlite3-3.4.9-3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:pdns-backend-sqlite3-3.4.9-3.1">pdns-backend-sqlite3-3.4.9-3.1 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue has been found in PowerDNS Authoritative Server versions up to and including 3.4.10, 4.0.1 allowing an authorized user to crash the server by inserting a specially crafted record in a zone under their control then sending a DNS query for that record. The issue is due to an integer overflow when checking if the content of the record matches the expected size, allowing an attacker to cause a read past the buffer boundary.</Note>
    </Notes>
    <CVE>CVE-2016-2120</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:pdns-3.4.9-3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:pdns-backend-ldap-3.4.9-3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:pdns-backend-lua-3.4.9-3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:pdns-backend-mydns-3.4.9-3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:pdns-backend-mysql-3.4.9-3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:pdns-backend-postgresql-3.4.9-3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:pdns-backend-sqlite3-3.4.9-3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:pdns-3.4.9-3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:pdns-backend-ldap-3.4.9-3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:pdns-backend-lua-3.4.9-3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:pdns-backend-mydns-3.4.9-3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:pdns-backend-mysql-3.4.9-3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:pdns-backend-postgresql-3.4.9-3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:pdns-backend-sqlite3-3.4.9-3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-01/msg00102.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-2120.html</URL>
        <Description>CVE-2016-2120</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1018329</URL>
        <Description>SUSE Bug 1018329</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue has been found in PowerDNS before 3.4.11 and 4.0.2, and PowerDNS recursor before 3.7.4 and 4.0.4, allowing a remote, unauthenticated attacker to cause an abnormal CPU usage load on the PowerDNS server by sending crafted DNS queries, which might result in a partial denial of service if the system becomes overloaded. This issue is based on the fact that the PowerDNS server parses all records present in a query regardless of whether they are needed or even legitimate. A specially crafted query containing a large number of records can be used to take advantage of that behaviour.</Note>
    </Notes>
    <CVE>CVE-2016-7068</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:pdns-3.4.9-3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:pdns-backend-ldap-3.4.9-3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:pdns-backend-lua-3.4.9-3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:pdns-backend-mydns-3.4.9-3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:pdns-backend-mysql-3.4.9-3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:pdns-backend-postgresql-3.4.9-3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:pdns-backend-sqlite3-3.4.9-3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:pdns-3.4.9-3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:pdns-backend-ldap-3.4.9-3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:pdns-backend-lua-3.4.9-3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:pdns-backend-mydns-3.4.9-3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:pdns-backend-mysql-3.4.9-3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:pdns-backend-postgresql-3.4.9-3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:pdns-backend-sqlite3-3.4.9-3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-01/msg00102.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-7068.html</URL>
        <Description>CVE-2016-7068</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1018326</URL>
        <Description>SUSE Bug 1018326</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue has been found in PowerDNS Authoritative Server before 3.4.11 and 4.0.2 allowing a remote, unauthenticated attacker to cause a denial of service by opening a large number of TCP connections to the web server. If the web server runs out of file descriptors, it triggers an exception and terminates the whole PowerDNS process. While it's more complicated for an unauthorized attacker to make the web server run out of file descriptors since its connection will be closed just after being accepted, it might still be possible.</Note>
    </Notes>
    <CVE>CVE-2016-7072</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:pdns-3.4.9-3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:pdns-backend-ldap-3.4.9-3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:pdns-backend-lua-3.4.9-3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:pdns-backend-mydns-3.4.9-3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:pdns-backend-mysql-3.4.9-3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:pdns-backend-postgresql-3.4.9-3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:pdns-backend-sqlite3-3.4.9-3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:pdns-3.4.9-3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:pdns-backend-ldap-3.4.9-3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:pdns-backend-lua-3.4.9-3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:pdns-backend-mydns-3.4.9-3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:pdns-backend-mysql-3.4.9-3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:pdns-backend-postgresql-3.4.9-3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:pdns-backend-sqlite3-3.4.9-3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-01/msg00102.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-7072.html</URL>
        <Description>CVE-2016-7072</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1018327</URL>
        <Description>SUSE Bug 1018327</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue has been found in PowerDNS before 3.4.11 and 4.0.2, and PowerDNS recursor before 4.0.4, allowing an attacker in position of man-in-the-middle to alter the content of an AXFR because of insufficient validation of TSIG signatures. A missing check of the TSIG time and fudge values was found in AXFRRetriever, leading to a possible replay attack.</Note>
    </Notes>
    <CVE>CVE-2016-7073</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:pdns-3.4.9-3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:pdns-backend-ldap-3.4.9-3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:pdns-backend-lua-3.4.9-3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:pdns-backend-mydns-3.4.9-3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:pdns-backend-mysql-3.4.9-3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:pdns-backend-postgresql-3.4.9-3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:pdns-backend-sqlite3-3.4.9-3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:pdns-3.4.9-3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:pdns-backend-ldap-3.4.9-3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:pdns-backend-lua-3.4.9-3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:pdns-backend-mydns-3.4.9-3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:pdns-backend-mysql-3.4.9-3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:pdns-backend-postgresql-3.4.9-3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:pdns-backend-sqlite3-3.4.9-3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-01/msg00102.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-7073.html</URL>
        <Description>CVE-2016-7073</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1018328</URL>
        <Description>SUSE Bug 1018328</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue has been found in PowerDNS before 3.4.11 and 4.0.2, and PowerDNS recursor before 4.0.4, allowing an attacker in position of man-in-the-middle to alter the content of an AXFR because of insufficient validation of TSIG signatures. A missing check that the TSIG record is the last one, leading to the possibility of parsing records that are not covered by the TSIG signature.</Note>
    </Notes>
    <CVE>CVE-2016-7074</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:pdns-3.4.9-3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:pdns-backend-ldap-3.4.9-3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:pdns-backend-lua-3.4.9-3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:pdns-backend-mydns-3.4.9-3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:pdns-backend-mysql-3.4.9-3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:pdns-backend-postgresql-3.4.9-3.1</ProductID>
        <ProductID>openSUSE Leap 42.1:pdns-backend-sqlite3-3.4.9-3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:pdns-3.4.9-3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:pdns-backend-ldap-3.4.9-3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:pdns-backend-lua-3.4.9-3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:pdns-backend-mydns-3.4.9-3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:pdns-backend-mysql-3.4.9-3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:pdns-backend-postgresql-3.4.9-3.1</ProductID>
        <ProductID>openSUSE Leap 42.2:pdns-backend-sqlite3-3.4.9-3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-01/msg00102.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-7074.html</URL>
        <Description>CVE-2016-7074</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1018328</URL>
        <Description>SUSE Bug 1018328</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
