#VU47126 Double Free in PowerDNS Authoritative - CVE-2020-24698
Published: September 28, 2020 / Updated: February 7, 2021
Vulnerability identifier: #VU47126
Vulnerability risk: Medium
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Green
CVE-ID: CVE-2020-24698
CWE-ID: CWE-415
Exploitation vector: Remote access
Exploit availability:
No public exploit available
Vulnerable software:
PowerDNS Authoritative
PowerDNS Authoritative
Software vendor:
PowerDNS.COM B.V.
PowerDNS.COM B.V.
Description
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error when processing queries with a GSS-TSIG signature. A remote attacker can pass specially crafted DNS query to the application, trigger double free error and execute arbitrary code on the target system.
Successful exploitation of the vulnerability requires that the application is compiled with –enable-experimental-gss-tsig flag.
Remediation
Install update from vendor's website.