Impact
The vulnerability is a concurrency and locking defect in the GSS‑TSIG implementation of the PowerDNS Authoritative server. This defect allows a race condition that could enable an attacker to corrupt internal state or cause processing delays, potentially leading to data integrity issues or denial of service. The weakness is a classic race condition (CWE‑1345).
Affected Systems
Affected systems are deployments of the PowerDNS Authoritative server. The product line is identified as PowerDNS:Authoritative, and no specific version information is provided in the advisory, so all released versions may need to be reviewed for the presence of the defect.
Risk and Exploitability
The CVSS score of 5.9 places the risk in a medium category, and the EPSS score is not available, making it difficult to gauge current exploitation probability. The advisory does not list the vulnerability in CISA’s KEV catalog. Because the flaw relates to GSS‑TSIG authentication handshakes, it is inferred that the attack vector is network‑based and could be triggered by sending specially crafted GSS‑TSIG queries, though this inference is based solely on the nature of GSS‑TSIG traffic and not directly stated in the advisory.
OpenCVE Enrichment
Debian DSA