Headline
CVE-2020-12244: Insufficient validation of DNSSEC signatures — PowerDNS Recursor documentation
An issue has been found in PowerDNS Recursor 4.1.0 through 4.3.0 where records in the answer section of a NXDOMAIN response lacking an SOA were not properly validated in SyncRes::processAnswer, allowing an attacker to bypass DNSSEC validation.
PowerDNS Security Advisory 2020-02: Insufficient validation of DNSSEC signatures¶
- CVE: CVE-2020-12244
- Date: May 19th 2020
- Affects: PowerDNS Recursor from 4.1.0 up to and including 4.3.0
- Not affected: 4.3.1, 4.2.2, 4.1.16
- Severity: Medium
- Impact: Denial of existence spoofing
- Exploit: This problem can be triggered by an attacker in position of man-in-the-middle
- Risk of system compromise: No
- Solution: Upgrade to a non-affected version
- Workaround: None
An issue has been found in PowerDNS Recursor 4.1.0 through 4.3.0 where records in the answer section of a NXDOMAIN response lacking an SOA were not properly validated in SyncRes::processAnswer. This would allow an attacker in position of man-in-the-middle to send a NXDOMAIN answer for a name that does exist, bypassing DNSSEC validation.
This issue has been assigned CVE-2020-12244.
PowerDNS Recursor from 4.1.0 up to and including 4.3.0 is affected.
Please note that at the time of writing, PowerDNS Authoritative 4.0 and below are no longer supported, as described in https://doc.powerdns.com/authoritative/appendices/EOL.html.
We would like to thank Matt Nordhoff for finding and subsequently reporting this issue!