Description
An issue has been found in PowerDNS Recursor 4.1.0 through 4.3.0 where records in the answer section of a NXDOMAIN response lacking an SOA were not properly validated in SyncRes::processAnswer, allowing an attacker to bypass DNSSEC validation.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-4691-1 | pdns-recursor security update |
EUVD |
EUVD-2020-4559 | An issue has been found in PowerDNS Recursor 4.1.0 through 4.3.0 where records in the answer section of a NXDOMAIN response lacking an SOA were not properly validated in SyncRes::processAnswer, allowing an attacker to bypass DNSSEC validation. |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T11:48:58.374Z
Reserved: 2020-04-24T00:00:00.000Z
Link: CVE-2020-12244
No data.
Status : Modified
Published: 2020-05-19T14:15:11.097
Modified: 2024-11-21T04:59:22.253
Link: CVE-2020-12244
No data.
OpenCVE Enrichment
No data.
Weaknesses
Debian DSA
EUVD