Unrated severityNVD Advisory· Published Nov 9, 2018· Updated Aug 5, 2024
CVE-2018-14644
CVE-2018-14644
Description
An issue has been found in PowerDNS Recursor from 4.0.0 up to and including 4.1.4. A remote attacker sending a DNS query for a meta-type like OPT can lead to a zone being wrongly cached as failing DNSSEC validation. It only arises if the parent zone is signed, and all the authoritative servers for that parent zone answer with FORMERR to a query for at least one of the meta-types. As a result, subsequent queries from clients requesting DNSSEC validation will be answered with a ServFail.
Affected products
3- osv-coords3 versionspkg:rpm/opensuse/pdns-recursor&distro=openSUSE%20Tumbleweedpkg:rpm/suse/pdns-recursor&distro=SUSE%20Package%20Hub%2012%20SP1pkg:rpm/suse/pdns-recursor&distro=SUSE%20Package%20Hub%2015
< 4.5.5-1.3+ 2 more
- (no CPE)range: < 4.5.5-1.3
- (no CPE)range: < 4.1.8-13.1
- (no CPE)range: < 4.1.2-bp150.2.3.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2- bugzilla.redhat.com/show_bug.cgimitrex_refsource_CONFIRM
- docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2018-07.htmlmitrex_refsource_CONFIRM
News mentions
0No linked articles in our index yet.