CVE-2018-14644

An issue has been found in PowerDNS Recursor from 4.0.0 up to and including 4.1.4. A remote attacker sending a DNS query for a meta-type like OPT can lead to a zone being wrongly cached as failing DNSSEC validation. It only arises if the parent zone is signed, and all the authoritative servers for that parent zone answer with FORMERR to a query for at least one of the meta-types. As a result, subsequent queries from clients requesting DNSSEC validation will be answered with a ServFail.
Configurations

Configuration 1 (hide)

cpe:2.3:a:powerdns:recursor:*:*:*:*:*:*:*:*

History

21 Nov 2024, 03:49

Type Values Removed Values Added
CVSS v2 : 4.3
v3 : 5.9
v2 : 4.3
v3 : 5.3
References () https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14644 - Issue Tracking, Third Party Advisory () https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14644 - Issue Tracking, Third Party Advisory
References () https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2018-07.html - Vendor Advisory () https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2018-07.html - Vendor Advisory

Information

Published : 2018-11-09 19:29

Updated : 2024-11-21 03:49


NVD link : CVE-2018-14644

Mitre link : CVE-2018-14644

CVE.ORG link : CVE-2018-14644


JSON object : View

Products Affected

powerdns

  • recursor
CWE
CWE-20

Improper Input Validation