Unrated severityNVD Advisory· Published May 19, 2020· Updated Aug 4, 2024
CVE-2020-12244
CVE-2020-12244
Description
An issue has been found in PowerDNS Recursor 4.1.0 through 4.3.0 where records in the answer section of a NXDOMAIN response lacking an SOA were not properly validated in SyncRes::processAnswer, allowing an attacker to bypass DNSSEC validation.
Affected products
5- PowerDNS/PowerDNS Recursordescription
- osv-coords4 versionspkg:rpm/opensuse/pdns-recursor&distro=openSUSE%20Leap%2015.1pkg:rpm/opensuse/pdns-recursor&distro=openSUSE%20Tumbleweedpkg:rpm/suse/pdns-recursor&distro=SUSE%20Package%20Hub%2012%20SP1pkg:rpm/suse/pdns-recursor&distro=SUSE%20Package%20Hub%2015%20SP1
< 4.1.12-bp151.4.3.1+ 3 more
- (no CPE)range: < 4.1.12-bp151.4.3.1
- (no CPE)range: < 4.5.5-1.3
- (no CPE)range: < 4.1.12-bp151.4.3.1
- (no CPE)range: < 4.1.12-bp151.4.3.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
6- lists.opensuse.org/opensuse-security-announce/2020-05/msg00052.htmlmitrevendor-advisoryx_refsource_SUSE
- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NMP72NJGKBWR5WEBXAWX5KSLQUDFTG6S/mitrevendor-advisoryx_refsource_FEDORA
- lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PS4ZN5XGENYNFKX7QIIOUCQQHXE37GJF/mitrevendor-advisoryx_refsource_FEDORA
- www.debian.org/security/2020/dsa-4691mitrevendor-advisoryx_refsource_DEBIAN
- www.openwall.com/lists/oss-security/2020/05/19/3mitremailing-listx_refsource_MLIST
- doc.powerdns.com/recursor/security-advisories/powerdns-advisory-2020-02.htmlmitrex_refsource_CONFIRM
News mentions
0No linked articles in our index yet.