First published: Tue Jan 29 2019(Updated: )
An issue has been found in PowerDNS Recursor versions 4.1.x before 4.1.9 where records in the answer section of responses received from authoritative servers with the AA flag not set were not properly validated, allowing an attacker to bypass DNSSEC validation.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
PowerDNS Recursor | >=4.1.0<=4.1.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-3807 is a vulnerability found in PowerDNS Recursor versions 4.1.x before 4.1.9.
CVE-2019-3807 has a severity rating of critical (9.8).
CVE-2019-3807 allows an attacker to bypass DNSSEC validation in PowerDNS Recursor versions 4.1.x before 4.1.9.
To fix CVE-2019-3807, update PowerDNS Recursor to version 4.1.9 or later.
For more information about CVE-2019-3807, you can refer to the following references: [Red Hat Bugzilla](https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3807) and [PowerDNS Advisory](https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2019-02.html).