First published: Fri Oct 16 2020(Updated: )
An issue has been found in PowerDNS Recursor before 4.1.18, 4.2.x before 4.2.5, and 4.3.x before 4.3.5. A remote attacker can cause the cached records for a given name to be updated to the Bogus DNSSEC validation state, instead of their actual DNSSEC Secure state, via a DNS ANY query. This results in a denial of service for installation that always validate (dnssec=validate), and for clients requesting validation when on-demand validation is enabled (dnssec=process).
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
PowerDNS Recursor | <4.1.18 | |
PowerDNS Recursor | >=4.2.0<4.2.5 | |
PowerDNS Recursor | >=4.3.0<4.3.5 | |
openSUSE Backports SLE | =15.0-sp1 | |
openSUSE Backports SLE | =15.0-sp2 | |
openSUSE Leap | =15.1 | |
openSUSE Leap | =15.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-25829 is a vulnerability found in PowerDNS Recursor before version 4.1.18, 4.2.x before 4.2.5, and 4.3.x before 4.3.5.
CVE-2020-25829 allows a remote attacker to cause the cached records for a given name to be updated to the Bogus DNSSEC validation state, instead of their actual DNSSEC Secure state, via a DNS ANY query.
CVE-2020-25829 has a severity level of high, with a CVSS score of 7.5.
PowerDNS Recursor versions before 4.1.18, 4.2.x before 4.2.5, and 4.3.x before 4.3.5 are affected by CVE-2020-25829.
To fix CVE-2020-25829, it is recommended to update PowerDNS Recursor to version 4.1.18, 4.2.5, or 4.3.5, depending on the affected version.