CVE-2017-15090 — Improper Verification of Cryptographic Signature in Recursor
Severity
5.9MEDIUMNVD
EPSS
0.0%
top 99.95%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJan 23
Latest updateMay 13
Description
An issue has been found in the DNSSEC validation component of PowerDNS Recursor from 4.0.0 and up to and including 4.0.6, where the signatures might have been accepted as valid even if the signed data was not in bailiwick of the DNSKEY used to sign it. This allows an attacker in position of man-in-the-middle to alter the content of records by issuing a valid signature for the crafted records.
CVSS vector
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:NExploitability: 2.2 | Impact: 3.6
Affected Packages2 packages
Patches
🔴Vulnerability Details
3GHSA▶
GHSA-pr86-5p67-45rx: An issue has been found in the DNSSEC validation component of PowerDNS Recursor from 4↗2022-05-13
OSV▶
CVE-2017-15090: An issue has been found in the DNSSEC validation component of PowerDNS Recursor from 4↗2018-01-23
CVEList▶
CVE-2017-15090: An issue has been found in the DNSSEC validation component of PowerDNS Recursor from 4↗2018-01-23
📋Vendor Advisories
1Debian▶
CVE-2017-15090: pdns-recursor - An issue has been found in the DNSSEC validation component of PowerDNS Recursor ...↗2017