First published: Mon Jan 22 2018(Updated: )
Improper input validation bugs in DNSSEC validators components in PowerDNS version 4.1.0 allow attacker in man-in-the-middle position to deny existence of some data in DNS via packet replay.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
PowerDNS Recursor | =4.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2018-1000003.
The severity of CVE-2018-1000003 is medium with a severity value of 3.7.
PowerDNS Recursor version 4.1.0 is affected by CVE-2018-1000003.
CVE-2018-1000003 allows an attacker in a man-in-the-middle position to deny the existence of some data in DNS via packet replay.
Yes, there is a fix available. Please refer to the PowerDNS security advisory at https://doc.powerdns.com/recursor/security-advisories/powerdns-advisory-2018-01.html for more information.