PowerDNS Security Advisory 2016-04: Insufficient validation of TSIG signatures. Two issues found in PowerDNS Authoritative Server allow an attacker in Man-in-the-Middle position to alter AXFR content due to insufficient TSIG signature validation
Reporter | Title | Published | Views | Family All 46 |
---|---|---|---|---|
ArchLinux | [ASA-201701-30] powerdns-recursor: multiple issues | 19 Jan 201700:00 | – | archlinux |
ArchLinux | [ASA-201701-29] powerdns: multiple issues | 19 Jan 201700:00 | – | archlinux |
Fedora | [SECURITY] Fedora 24 Update: pdns-recursor-4.0.4-1.fc24 | 25 Jan 201700:22 | – | fedora |
Fedora | [SECURITY] Fedora 25 Update: pdns-4.0.3-1.fc25 | 29 Jan 201700:23 | – | fedora |
Fedora | [SECURITY] Fedora 25 Update: pdns-recursor-4.0.4-1.fc25 | 24 Jan 201723:22 | – | fedora |
Fedora | [SECURITY] Fedora 24 Update: pdns-4.0.3-1.fc24 | 29 Jan 201700:50 | – | fedora |
OpenVAS | Fedora Update for pdns-recursor FEDORA-2017-8308bc2a6e | 25 Jan 201700:00 | – | openvas |
OpenVAS | Debian Security Advisory DSA 3764-1 (pdns - security update) | 13 Jan 201700:00 | – | openvas |
OpenVAS | Mageia: Security Advisory (MGASA-2017-0033) | 28 Jan 202200:00 | – | openvas |
OpenVAS | Debian: Security Advisory (DLA-798-1) | 8 Mar 202300:00 | – | openvas |
# SPDX-FileCopyrightText: 2018 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only
if(description)
{
script_oid("1.3.6.1.4.1.25623.1.0.112374");
script_version("2023-07-20T05:05:18+0000");
script_tag(name:"last_modification", value:"2023-07-20 05:05:18 +0000 (Thu, 20 Jul 2023)");
script_tag(name:"creation_date", value:"2018-09-12 16:54:11 +0200 (Wed, 12 Sep 2018)");
script_tag(name:"cvss_base", value:"4.3");
script_tag(name:"cvss_base_vector", value:"AV:N/AC:M/Au:N/C:N/I:P/A:N");
script_tag(name:"severity_vector", value:"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N");
script_tag(name:"severity_origin", value:"NVD");
script_tag(name:"severity_date", value:"2019-10-09 23:19:00 +0000 (Wed, 09 Oct 2019)");
script_cve_id("CVE-2016-7073", "CVE-2016-7074");
script_tag(name:"qod_type", value:"remote_banner_unreliable");
script_tag(name:"solution_type", value:"VendorFix");
script_name("PowerDNS Security Advisory 2016-04: Insufficient validation of TSIG signatures");
script_category(ACT_GATHER_INFO);
script_copyright("Copyright (C) 2018 Greenbone AG");
script_family("General");
script_dependencies("pdns_version.nasl");
script_mandatory_keys("powerdns/recursor_or_authoritative_server/installed");
script_tag(name:"summary", value:"Two issues have been found in PowerDNS Authoritative Server allowing
an attacker in position of man-in-the-middle to alter the content of an AXFR because of insufficient validation
of TSIG signatures.");
script_tag(name:"insight", value:"The first issue is a missing check of the TSIG time and fudge values in AXFRRetriever,
leading to a possible replay attack. This issue has been assigned CVE-2016-7073.
The second issue is a missing check that the TSIG record is the last one, leading to the possibility of parsing records that are not covered by the TSIG signature.
This issue has been assigned CVE-2016-7074.");
script_tag(name:"vuldetect", value:"Checks if a vulnerable version is present on the target host.");
script_tag(name:"affected", value:"PowerDNS Authoritative Server up to and including 3.4.10 and 4.0.1 are affected.
PowerDNS Recursor from 4.0.0 up to and including 4.0.3 are affected.");
script_tag(name:"solution", value:"Update PowerDNS Authoritative Server to version 3.4.11 or 4.0.2 respectively.
Update PowerDNS Recursor 4.x.x to version 4.0.4.");
script_xref(name:"URL", value:"https://doc.powerdns.com/md/security/powerdns-advisory-2016-04/");
exit(0);
}
include("version_func.inc");
include("host_details.inc");
cpe_list = make_list( 'cpe:/a:powerdns:authoritative_server', 'cpe:/a:powerdns:recursor' );
if( ! list_infos = get_app_port_from_list( cpe_list:cpe_list ) )
exit( 0 );
cpe = list_infos["cpe"];
port = list_infos["port"];
if( ! infos = get_app_version_and_proto( cpe:cpe, port:port ) )
exit( 0 );
version = infos["version"];
proto = infos["proto"];
if( cpe == 'cpe:/a:powerdns:authoritative_server' ) {
if( version_is_less( version:version, test_version:"3.4.11" ) ) {
report = report_fixed_ver( installed_version:version, fixed_version:"3.4.11" );
security_message( data:report, port:port, proto:proto );
exit( 0 );
}
if( version_is_equal( version:version, test_version:"4.0.1" ) ) {
report = report_fixed_ver( installed_version:version, fixed_version:"4.0.2" );
security_message( data:report, port:port, proto:proto );
exit( 0 );
}
} else if ( cpe == 'cpe:/a:powerdns:recursor' ) {
if( version_in_range( version:version, test_version:"4.0.0", test_version2:"4.0.3" ) ) {
report = report_fixed_ver( installed_version:version, fixed_version:"4.0.4" );
security_message( data:report, port:port, proto:proto );
exit( 0 );
}
}
exit( 99 );
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo