CVE-2020-12244Improper Verification of Cryptographic Signature in Recursor

Severity
7.5HIGHNVD
EPSS
0.1%
top 73.82%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMay 19
Latest updateMay 24

Description

An issue has been found in PowerDNS Recursor 4.1.0 through 4.3.0 where records in the answer section of a NXDOMAIN response lacking an SOA were not properly validated in SyncRes::processAnswer, allowing an attacker to bypass DNSSEC validation.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:NExploitability: 3.9 | Impact: 3.6

Affected Packages3 packages

NVDpowerdns/recursor4.1.04.3.0
NVDopensuse/leap15.1

Also affects: Debian Linux 10.0, Fedora 31, 32

🔴Vulnerability Details

3
GHSA
GHSA-52f2-92w4-mx97: An issue has been found in PowerDNS Recursor 42022-05-24
OSV
CVE-2020-12244: An issue has been found in PowerDNS Recursor 42020-05-19
CVEList
CVE-2020-12244: An issue has been found in PowerDNS Recursor 42020-05-19

📋Vendor Advisories

1
Debian
CVE-2020-12244: pdns-recursor - An issue has been found in PowerDNS Recursor 4.1.0 through 4.3.0 where records i...2020

💬Community

3
Bugzilla
CVE-2020-12244 pdns-recursor: incorrect handling of records in the answer section of a NXDOMAIN response lacking an SOA allows an attacker to bypass DNSSEC validation [epel-all]2020-05-26
Bugzilla
CVE-2020-12244 pdns-recursor: incorrect handling of records in the answer section of a NXDOMAIN response lacking an SOA allows an attacker to bypass DNSSEC validation [fedora-all]2020-05-26
Bugzilla
CVE-2020-12244 pdns-recursor: incorrect handling of records in the answer section of a NXDOMAIN response lacking an SOA allows an attacker to bypass DNSSEC validation2020-05-26
CVE-2020-12244 — Powerdns Recursor vulnerability | cvebase