CVE-2020-12244
19.05.2020, 14:15
An issue has been found in PowerDNS Recursor 4.1.0 through 4.3.0 where records in the answer section of a NXDOMAIN response lacking an SOA were not properly validated in SyncRes::processAnswer, allowing an attacker to bypass DNSSEC validation.Enginsight
Vendor | Product | Version |
---|---|---|
powerdns | recursor | 4.1.0 ≤ 𝑥 ≤ 4.3.0 |
debian | debian_linux | 10.0 |
opensuse | backports_sle | 15.0:sp1 |
opensuse | leap | 15.1 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Common Weakness Enumeration
References