5
CVSSv2

CVE-2020-12244

Published: 19/05/2020 Updated: 07/11/2023
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Summary

An issue has been found in PowerDNS Recursor 4.1.0 up to and including 4.3.0 where records in the answer section of a NXDOMAIN response lacking an SOA were not properly validated in SyncRes::processAnswer, allowing an malicious user to bypass DNSSEC validation.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

powerdns recursor

fedoraproject fedora 31

fedoraproject fedora 32

debian debian linux 10.0

opensuse leap 15.1

opensuse backports sle 15.0

Vendor Advisories

Two vulnerabiliites have been discovered in PDNS Recursor, a resolving name server; a traffic amplification attack against third party authoritative name servers (NXNSAttack) and insufficient validation of NXDOMAIN responses lacking an SOA The version of pdns-recursor in the oldstable distribution (stretch) is no longer supported If these securit ...
An issue has been found in PowerDNS Recursor before 431 and 422 where records in the answer section of a NXDOMAIN response lacking an SOA were not properly validated in SyncRes::processAnswer This would allow an attacker in position of man-in-the-middle to send a NXDOMAIN answer for a name that does exist, bypassing DNSSEC validation ...