Wiz Agents & Workflows are here

CVE-2021-36754
Linux Alpine vulnerability analysis and mitigation

Overview

PowerDNS Authoritative Server version 4.5.0 contains a vulnerability (CVE-2021-36754) discovered on July 26th, 2021, that allows remote attackers to crash the server process. The vulnerability affects only version 4.5.0, while versions 4.4.x and below, as well as version 4.5.1, are not affected (PowerDNS Advisory).

Technical details

The vulnerability occurs when the server receives a DNS query with QTYPE 65535, which triggers an uncaught out-of-bounds exception. This issue is classified with a CVSS v3.1 Base Score of 7.5 (HIGH) with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H. The vulnerability is tracked under CWE-119 (Improper Restriction of Operations within the Bounds of a Memory Buffer) (NVD).

Impact

When exploited, the vulnerability results in a denial of service condition by causing the PowerDNS Authoritative Server process to crash. However, when the server is running under a supervisor like supervisord or systemd, the impact is limited to a somewhat degraded service as the process will automatically restart (PowerDNS Advisory).

Mitigation and workarounds

The primary solution is to upgrade to PowerDNS Authoritative Server version 4.5.1. For users who cannot immediately upgrade but have dnsdist in place, a temporary workaround is available by implementing a filter using the command addAction(QTypeRule(65535), RCodeAction(DNSRCode.REFUSED)) to block the malicious queries (PowerDNS Advisory).

Community reactions

The vulnerability was discovered by Reinier Schoof and Robin Geuze of TransIP, who noticed crashes in production environments and promptly reported the issue to PowerDNS (PowerDNS Advisory).

Additional resources


SourceThis report was generated using AI

Related Linux Alpine vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2026-33986HIGH7.5
  • WolfiWolfi
  • freerdp2
NoYesMar 30, 2026
CVE-2026-33984HIGH7.5
  • WolfiWolfi
  • freerdp
NoYesMar 30, 2026
CVE-2026-33987HIGH7.1
  • WolfiWolfi
  • freerdp2
NoYesMar 30, 2026
CVE-2026-33985MEDIUM5.9
  • WolfiWolfi
  • freerdp2
NoYesMar 30, 2026
CVE-2026-33995MEDIUM5.3
  • WolfiWolfi
  • libwinpr
NoYesMar 30, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management