This security bulletin contains one medium risk vulnerability.
The vulnerability allows a remote non-authenticated attacker to manipulate data.
An issue has been found in PowerDNS before 3.4.11 and 4.0.2, and PowerDNS recursor before 4.0.4, allowing an attacker in position of man-in-the-middle to alter the content of an AXFR because of insufficient validation of TSIG signatures. A missing check of the TSIG time and fudge values was found in AXFRRetriever, leading to a possible replay attack.Mitigation
Install update from vendor's website.Vulnerable software versions
PowerDNS: 3.4.0 - 3.4.10Fixed software versions
Q & A
Can this vulnerability be exploited remotely?
How the attacker can exploit this vulnerability?
Is there known malware, which exploits this vulnerability?