First published: Fri Feb 17 2012(Updated: )
The resolver in PowerDNS Recursor (aka pdns_recursor) 3.3 overwrites cached server names and TTL values in NS records during the processing of a response to an A record query, which allows remote attackers to trigger continued resolvability of revoked domain names via a "ghost domain names" attack.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
PowerDNS Recursor | =3.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-1193 has a medium severity that can lead to cache poisoning and unauthorized domain resolution.
To fix CVE-2012-1193, upgrade PowerDNS Recursor to a version later than 3.3 that addresses this vulnerability.
CVE-2012-1193 can facilitate ghost domain names attacks, allowing remote attackers to exploit the resolver's behavior.
PowerDNS Recursor version 3.3 is affected by CVE-2012-1193.
There are no official workarounds for CVE-2012-1193, so upgrading to a patched version is recommended.