#VU15962 Improper input validation in PowerDNS Recursor - CVE-2018-14644

 

#VU15962 Improper input validation in PowerDNS Recursor - CVE-2018-14644

Published: November 19, 2018


Vulnerability identifier: #VU15962
Vulnerability risk: Low
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2018-14644
CWE-ID: CWE-20
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vulnerable software:
PowerDNS Recursor
Software vendor:
PowerDNS.COM B.V.

Description

The vulnerability allows a remote attacker to cause DoS condition on the target system.

The vulnerability exists due to an error if the parent zone is signed, and all the authoritative servers for that parent zone answer with FORMERR to a query for at least one of the meta-types. A remote attacker can send a DNS query for a meta-type like OPT, lead to a zone being wrongly cached as failing DNSSEC validation and cause subsequent queries from clients to request DNSSEC validation answered with a ServFail.


Remediation

The vulnerability has been fixed in the versions 4.1.5.

External links