First published: Tue Sep 11 2018(Updated: )
An issue has been found in PowerDNS before 3.4.11 and 4.0.2, and PowerDNS recursor before 4.0.4, allowing an attacker in position of man-in-the-middle to alter the content of an AXFR because of insufficient validation of TSIG signatures. A missing check that the TSIG record is the last one, leading to the possibility of parsing records that are not covered by the TSIG signature.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
PowerDNS Authoritative | <3.4.11 | |
PowerDNS Authoritative | >=4.0.0<4.0.2 | |
PowerDNS Recursor | <4.0.4 | |
Debian Debian Linux | =8.0 | |
debian/pdns | 4.1.6-3+deb10u1 4.4.1-1 4.7.3-2 4.8.3-1 4.8.3-2 | |
debian/pdns-recursor | 4.1.11-1+deb10u1 4.4.2-3 4.8.4-1 4.9.1-3 4.9.1-4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-7074 is a vulnerability found in PowerDNS before 3.4.11 and 4.0.2, and PowerDNS recursor before 4.0.4, allowing an attacker in position of man-in-the-middle to alter the content of an AXFR due to insufficient validation of TSIG signatures.
CVE-2016-7074 allows an attacker in a man-in-the-middle position to modify the content of an AXFR in PowerDNS due to inadequate validation of TSIG signatures.
CVE-2016-7074 has a severity level of medium with a CVSS score of 5.9.
PowerDNS versions before 3.4.11 and 4.0.2, and PowerDNS recursor before 4.0.4 are affected by CVE-2016-7074.
To fix CVE-2016-7074, you should upgrade PowerDNS to version 3.4.11 or 4.0.2, and PowerDNS recursor to version 4.0.4.