First published: Fri Nov 09 2018(Updated: )
An issue has been found in PowerDNS Recursor from 4.0.0 up to and including 4.1.4. A remote attacker sending a DNS query for a meta-type like OPT can lead to a zone being wrongly cached as failing DNSSEC validation. It only arises if the parent zone is signed, and all the authoritative servers for that parent zone answer with FORMERR to a query for at least one of the meta-types. As a result, subsequent queries from clients requesting DNSSEC validation will be answered with a ServFail.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/pdns-recursor | 4.4.2-3 4.8.8-1 5.1.3-1 | |
PowerDNS | >=4.0.0<=4.1.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-14644 is a vulnerability found in PowerDNS Recursor from version 4.0.0 up to and including 4.1.4.
CVE-2018-14644 has a severity rating of 5.9, which is considered medium.
CVE-2018-14644 allows a remote attacker to send a DNS query for a specific meta-type, leading to a zone being incorrectly cached as failing DNSSEC validation if the parent zone is signed.
CVE-2018-14644 affects PowerDNS Recursor versions 4.0.0 up to and including 4.1.4.
To fix CVE-2018-14644, upgrade PowerDNS Recursor to version 4.1.5 or later.