First published: Tue Sep 11 2018(Updated: )
An issue has been found in PowerDNS before 3.4.11 and 4.0.2, and PowerDNS recursor before 4.0.4, allowing an attacker in position of man-in-the-middle to alter the content of an AXFR because of insufficient validation of TSIG signatures. A missing check of the TSIG time and fudge values was found in AXFRRetriever, leading to a possible replay attack.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/pdns | 4.1.6-3+deb10u1 4.4.1-1 4.7.3-2 4.8.3-1 4.8.3-2 | |
debian/pdns-recursor | 4.1.11-1+deb10u1 4.4.2-3 4.8.4-1 4.9.1-3 4.9.1-4 | |
PowerDNS | <3.4.11 | |
PowerDNS | >=4.0.0<4.0.2 | |
PowerDNS | <3.7.4 | |
PowerDNS | >=4.0.0<4.0.4 | |
Debian Linux | =8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-7073 is a vulnerability found in PowerDNS versions before 3.4.11 and 4.0.2, and PowerDNS recursor before 4.0.4, that allows an attacker in a man-in-the-middle position to alter the content of an AXFR due to insufficient validation of TSIG signatures.
PowerDNS Authoritative versions up to 3.4.11 and 4.0.2, PowerDNS Recursor versions up to 3.7.4 and 4.0.4, and Debian Linux version 8.0 are affected by CVE-2016-7073.
CVE-2016-7073 has a severity score of 5.9, which is considered medium.
Updating to PowerDNS versions 4.1.6-3+deb10u1, 4.4.1-1, 4.7.3-2, 4.8.3-1, or 4.8.3-2 for PowerDNS Authoritative, and 4.1.11-1+deb10u1, 4.4.2-3, 4.8.4-1, 4.9.1-3, or 4.9.1-4 for PowerDNS Recursor is recommended to fix CVE-2016-7073.
You can find more information about CVE-2016-7073 in the following references: [1] [2] [3]