Vulnerability identifier: #VU15961
Vulnerability risk: Low
CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID:
CWE-ID:
CWE-20
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
PowerDNS Recursor
Server applications /
DNS servers
PowerDNS Authoritative
Server applications /
DNS servers
Vendor: PowerDNS.COM B.V.
Description
The vulnerability allows a remote attacker to cause DoS condition on the target system.
The vulnerability exists due to DNSSEC validating clients consider the answer to be bogus until it expires from the packet cache. A remote attacker can craft a DNS query, cause an answer without DNSSEC records to be inserted into the packet cache and be returned to clients asking for DNSSEC records, thus hiding the presence of DNSSEC signatures for a specific qname and qtype.
Mitigation
The vulnerability has been fixed in the versions 4.1.5.
Vulnerable software versions
PowerDNS Recursor: 4.0.0 - 4.0.9, 4.1.0 - 4.1.4
PowerDNS Authoritative: 4.0.0 - 4.0.9, 4.1.0 - 4.1.4
External links
http://bugzilla.redhat.com/show_bug.cgi?id=1649028
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.