An issue has been found in PowerDNS Recursor 4.1.0 through 4.3.0 where records in the answer section of a NXDOMAIN response lacking an SOA were not properly validated in SyncRes::processAnswer, allowing an attacker to bypass DNSSEC validation.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
DSA-4691-1 | pdns-recursor security update |
![]() |
EUVD-2020-4559 | An issue has been found in PowerDNS Recursor 4.1.0 through 4.3.0 where records in the answer section of a NXDOMAIN response lacking an SOA were not properly validated in SyncRes::processAnswer, allowing an attacker to bypass DNSSEC validation. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T11:48:58.374Z
Reserved: 2020-04-24T00:00:00
Link: CVE-2020-12244

No data.

Status : Modified
Published: 2020-05-19T14:15:11.097
Modified: 2024-11-21T04:59:22.253
Link: CVE-2020-12244

No data.

No data.