5 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
0.004 Low
EPSS
Percentile
72.5%
Severity: High
Date : 2020-10-18
CVE-ID : CVE-2020-25829
Package : powerdns-recursor
Type : denial of service
Remote : Yes
Link : https://security.archlinux.org/AVG-1243
The package powerdns-recursor before version 4.3.5-1 is vulnerable to
denial of service.
Upgrade to 4.3.5-1.
The problem has been fixed upstream in version 4.3.5.
None.
An issue has been found in PowerDNS Recursor before 4.3.5 where a
remote attacker can cause the cached records for a given name to be
updated to the βBogusβ DNSSEC validation state, instead of their actual
DNSSEC βSecureβ state, via a DNS ANY query. This results in a denial of
service for installations that always validate (dnssec=validate) and
for clients requesting validation when on-demand validation is enabled
(dnssec=process).
A remote attacker can deny DNSSEC validation by updating the state of
cached entries.
https://www.openwall.com/lists/oss-security/2020/10/13/3
https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2020-07.html
https://downloads.powerdns.com/patches/2020-07/any-cache-update-4.3.4.diff
https://github.com/PowerDNS/pdns/commit/ae33c53e68a32189e0a2fd3df24821d3edce4503
https://security.archlinux.org/CVE-2020-25829
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ArchLinux | any | any | powerdns-recursor | <Β 4.3.5-1 | UNKNOWN |
docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2020-07.html
downloads.powerdns.com/patches/2020-07/any-cache-update-4.3.4.diff
github.com/PowerDNS/pdns/commit/ae33c53e68a32189e0a2fd3df24821d3edce4503
security.archlinux.org/AVG-1243
security.archlinux.org/CVE-2020-25829
www.openwall.com/lists/oss-security/2020/10/13/3
5 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
0.004 Low
EPSS
Percentile
72.5%