Denial of Service (DoS) Affecting powerdns package, versions [,4.1.18)[4.2.0,4.2.5)[4.3.0,4.3.5)


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.31% (71st percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Denial of Service (DoS) vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-UNMANAGED-POWERDNS-2371678
  • published26 Jan 2022
  • disclosed16 Oct 2020
  • creditUnknown

Introduced: 16 Oct 2020

CVE-2020-25829  (opens in a new tab)
CWE-400  (opens in a new tab)

How to fix?

Upgrade powerdns to version 4.1.18, 4.2.5, 4.3.5 or higher.

Overview

Affected versions of this package are vulnerable to Denial of Service (DoS). An issue has been found in PowerDNS Recursor before 4.1.18, 4.2.x before 4.2.5, and 4.3.x before 4.3.5. A remote attacker can cause the cached records for a given name to be updated to the Bogus DNSSEC validation state, instead of their actual DNSSEC Secure state, via a DNS ANY query. This results in a denial of service for installation that always validate (dnssec=validate), and for clients requesting validation when on-demand validation is enabled (dnssec=process).

References

CVSS Scores

version 3.1