CVE-2020-25829 Affecting pdns-recursor package, versions <4.3.5-r0


Severity

Recommended
0.0
high
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

EPSS
0.31% (70th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-ALPINE314-PDNSRECURSOR-1308853
  • published16 Oct 2020
  • disclosed16 Oct 2020

Introduced: 16 Oct 2020

CVE-2020-25829  (opens in a new tab)

How to fix?

Upgrade Alpine:3.14 pdns-recursor to version 4.3.5-r0 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream pdns-recursor package and not the pdns-recursor package as distributed by Alpine. See How to fix? for Alpine:3.14 relevant fixed versions and status.

An issue has been found in PowerDNS Recursor before 4.1.18, 4.2.x before 4.2.5, and 4.3.x before 4.3.5. A remote attacker can cause the cached records for a given name to be updated to the Bogus DNSSEC validation state, instead of their actual DNSSEC Secure state, via a DNS ANY query. This results in a denial of service for installation that always validate (dnssec=validate), and for clients requesting validation when on-demand validation is enabled (dnssec=process).

CVSS Scores

version 3.1