An issue has been found in PowerDNS Recursor 4.1.0 through 4.3.0 where records in the answer section of a NXDOMAIN response lacking an SOA were not properly validated in SyncRes::processAnswer, allowing an attacker to bypass DNSSEC validation.
References
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2020-05-19T13:51:39
Updated: 2020-06-14T18:06:08
Reserved: 2020-04-24T00:00:00
Link: CVE-2020-12244
JSON object: View
NVD Information
Status : Modified
Published: 2020-05-19T14:15:11.097
Modified: 2023-11-07T03:15:20.490
Link: CVE-2020-12244
JSON object: View
Redhat Information
No data.
CWE