CVE-2020-24697 — Authoritative vulnerability

6 documents6 sources
Severity
7.5HIGHNVD
EPSS
0.1%
top 67.58%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 2
Latest updateMay 24

Description

An issue was discovered in PowerDNS Authoritative through 4.3.0 when --enable-experimental-gss-tsig is used. A remote, unauthenticated attacker can cause a denial of service by sending crafted queries with a GSS-TSIG signature.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6

Affected Packages2 packages

â–¶NVDpowerdns/authoritative4.3.0
â–¶Debianopen-xchange/pdns< 4.4.0-1+3

🔴Vulnerability Details

3
GHSA
GHSA-p2mr-x5wg-48vh: An issue was discovered in PowerDNS Authoritative through 4↗2022-05-24
â–¶
OSV
CVE-2020-24697: An issue was discovered in PowerDNS Authoritative through 4↗2020-10-02
â–¶
CVEList
CVE-2020-24697: An issue was discovered in PowerDNS Authoritative through 4↗2020-10-02
â–¶

📋Vendor Advisories

1
Debian
CVE-2020-24697: pdns - An issue was discovered in PowerDNS Authoritative through 4.3.0 when --enable-ex...↗2020
â–¶

💬Community

1
Bugzilla
CVE-2020-24696 CVE-2020-24697 CVE-2020-24698 pdns: various issues in GSS-TSIG support↗2020-09-24
â–¶
CVE-2020-24697 — Powerdns Authoritative vulnerability | cvebase