Show vulnerabilities with patch / with exploit

OpenSUSE Linux update for pdns-recursor



Published: 2020-05-23
Severity Medium
Patch available YES
Number of vulnerabilities 3
CVE ID CVE-2020-10030
CVE-2020-10995
CVE-2020-12244
CWE ID CWE-125
CWE-20
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
SUSE Package Hub for SUSE Linux Enterprise
Universal components / Libraries / Libraries used by multiple products

Opensuse
Operating systems & Components / Operating system

SUSE Linux
Operating systems & Components / Operating system

Vendor SuSE
Novell

Security Advisory

1) Out-of-bounds read

Severity: Low

CVSSv3: 2.9 [CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2020-10030

CWE-ID: CWE-125 - Out-of-bounds Read

Exploit availability: No

Description

The vulnerability allows a local user to gain access to potentially sensitive information.

The vulnerability exists due to a boundary condition when processing a hostname via the gethostname()  function. A local user with ability to change system hostname can trigger out-of-bounds read error and read contents of memory on the system.

Mitigation

Update the affected packages.

Vulnerable software versions

SUSE Package Hub for SUSE Linux Enterprise: 12

Opensuse: 15.1

SUSE Linux: 15

CPE External links

https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00053.html

Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Input validation error

Severity: Medium

CVSSv3: 6.5 [CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C] [PCI]

CVE-ID: CVE-2020-10995

CWE-ID: CWE-20 - Improper Input Validation

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to insufficient validation of user-supplied input when processing DNS responses. A remote attacker who controls a malicious DNS server can send a specially crafted response and perform a denial of service (DoS) attack against third-party DNS servers.

The attack is triggered by random subdomains in the NSDNAME in NS records.

Mitigation

Update the affected packages.

Vulnerable software versions

SUSE Package Hub for SUSE Linux Enterprise: 12

Opensuse: 15.1

SUSE Linux: 15

CPE External links

https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00053.html

Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Input validation error

Severity: Medium

CVSSv3: 4.2 [CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N/E:U/RL:O/RC:C] [PCI]

CVE-ID: CVE-2020-12244

CWE-ID: CWE-20 - Improper Input Validation

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a spoofing attack.

The vulnerability exists due to records in the answer section of a NXDOMAIN response lacking an SOA are not properly validated in SyncRes::processAnswer. A remote attacker with ability to perform a Man-in-the-Middle (MitM) attack can send a NXDOMAIN answer for a name that does exist and bypass DNSSEC validation.

Successful exploitation of the vulnerability may allow an attacker to perform a spoofing attack.

Mitigation

Update the affected packages.

Vulnerable software versions

SUSE Package Hub for SUSE Linux Enterprise: 12

Opensuse: 15.1

SUSE Linux: 15

CPE External links

https://lists.opensuse.org/opensuse-security-announce/2020-05/msg00053.html

Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.