MGASA-2020-0223

Source
https://advisories.mageia.org/MGASA-2020-0223.html
Import Source
https://advisories.mageia.org/MGASA-2020-0223.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2020-0223
Related
Published
2020-05-24T18:04:47Z
Modified
2020-05-24T17:26:57Z
Summary
Updated pdns-recursor packages fix security vulnerabilities
Details

Updated pdns-recursor packages fix security vulnerabilities:

An issue in the DNS protocol has been found that allow malicious parties to use recursive DNS services to attack third party authoritative name servers. The attack uses a crafted reply by an authoritative name server to amplify the resulting traffic between the recursive and other authoritative name servers. Both types of service can suffer degraded performance as an effect (CVE-2020-10995).

An issue has been found in PowerDNS Recursor 4.1.0 through 4.3.0 where records in the answer section of a NXDOMAIN response lacking an SOA were not properly validated in SyncRes::processAnswer. This would allow an attacker in position of man-in-the-middle to send a NXDOMAIN answer for a name that does exist, bypassing DNSSEC validation (CVE-2020-12244).

References
Credits

Affected packages

Mageia:7 / pdns-recursor

Package

Name
pdns-recursor
Purl
pkg:rpm/mageia/pdns-recursor?distro=mageia-7

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.1.16-1.mga7

Ecosystem specific

{
    "section": "core"
}