An issue has been found in PowerDNS Recursor versions 4.1.x before 4.1.9 where records in the answer section of responses received from authoritative servers with the AA flag not set were not properly validated, allowing an attacker to bypass DNSSEC validation.
References
Link | Resource |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3807 | Issue Tracking Third Party Advisory |
https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2019-02.html | Vendor Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3807 | Issue Tracking Third Party Advisory |
https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2019-02.html | Vendor Advisory |
Configurations
History
21 Nov 2024, 04:42
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 6.4
v3 : 3.7 |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3807 - Issue Tracking, Third Party Advisory | |
References | () https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2019-02.html - Vendor Advisory |
Information
Published : 2019-01-29 17:29
Updated : 2024-11-21 04:42
NVD link : CVE-2019-3807
Mitre link : CVE-2019-3807
CVE.ORG link : CVE-2019-3807
JSON object : View
Products Affected
powerdns
- recursor