Description
An issue has been found in the DNSSEC validation component of PowerDNS Recursor from 4.0.0 and up to and including 4.0.6, where the signatures might have been accepted as valid even if the signed data was not in bailiwick of the DNSKEY used to sign it. This allows an attacker in position of man-in-the-middle to alter the content of records by issuing a valid signature for the crafted records.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
No advisories yet.
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-09-16T18:38:21.212Z
Reserved: 2017-10-08T00:00:00.000Z
Link: CVE-2017-15090
No data.
Status : Modified
Published: 2018-01-23T15:29:00.213
Modified: 2024-11-21T03:14:03.050
Link: CVE-2017-15090
No data.
OpenCVE Enrichment
No data.
Weaknesses