An issue has been found in PowerDNS Recursor before 4.1.18, 4.2.x before 4.2.5, and 4.3.x before 4.3.5. A remote attacker can cause the cached records for a given name to be updated to the Bogus DNSSEC validation state, instead of their actual DNSSEC Secure state, via a DNS ANY query. This results in a denial of service for installation that always validate (dnssec=validate), and for clients requesting validation when on-demand validation is enabled (dnssec=process).
[
{
"source": "https://github.com/powerdns/pdns/commit/77409aab0be43071b365760213894d6388c3df30",
"id": "CVE-2020-25829-ac387b1a",
"deprecated": false,
"signature_version": "v1",
"target": {
"function": "MemRecursorCache::updateValidationStatus",
"file": "pdns/recursor_cache.cc"
},
"digest": {
"length": 729.0,
"function_hash": "77679631441445527983920042920211549080"
},
"signature_type": "Function"
},
{
"source": "https://github.com/powerdns/pdns/commit/77409aab0be43071b365760213894d6388c3df30",
"id": "CVE-2020-25829-e5cd83e1",
"deprecated": false,
"signature_version": "v1",
"target": {
"file": "pdns/recursor_cache.cc"
},
"digest": {
"threshold": 0.9,
"line_hashes": [
"47417538831777855470350430050715081350",
"148055263521903558314326114750883219758",
"35080228024880871007699290772856527215",
"67316773013314591480806366431856137347",
"117026657073042240224421905896698093643",
"323213353731232169172399806756170124246",
"155500896485175737294500301755246166961",
"224196667708172987418133306458664934984",
"144653575526639387313445865962482611461",
"103108929300239247840240085865274340062",
"32309045751000532166148983162358670769",
"252546257047801208426498952786257063949"
]
},
"signature_type": "Line"
}
]