MGASA-2020-0223 - Updated pdns-recursor packages fix security vulnerabilities

Publication date: 24 May 2020
URL: https://advisories.mageia.org/MGASA-2020-0223.html
Type: security
Affected Mageia releases: 7
CVE: CVE-2020-10995,
     CVE-2020-12244

Updated pdns-recursor packages fix security vulnerabilities:

An issue in the DNS protocol has been found that allow malicious parties
to use recursive DNS services to attack third party authoritative name
servers. The attack uses a crafted reply by an authoritative name server
to amplify the resulting traffic between the recursive and other
authoritative name servers. Both types of service can suffer degraded
performance as an effect (CVE-2020-10995).

An issue has been found in PowerDNS Recursor 4.1.0 through 4.3.0 where
records in the answer section of a NXDOMAIN response lacking an SOA were
not properly validated in SyncRes::processAnswer. This would allow an
attacker in position of man-in-the-middle to send a NXDOMAIN answer for
a name that does exist, bypassing DNSSEC validation (CVE-2020-12244).

References:
- https://bugs.mageia.org/show_bug.cgi?id=26645
- https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2020-01.html
- https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2020-02.html
- https://www.openwall.com/lists/oss-security/2020/05/19/3
- https://doc.powerdns.com/recursor/changelog/4.1.html#change-4.1.16
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10995
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12244

SRPMS:
- 7/core/pdns-recursor-4.1.16-1.mga7

Mageia 2020-0223: pdns-recursor security update

Updated pdns-recursor packages fix security vulnerabilities: An issue in the DNS protocol has been found that allow malicious parties to use recursive DNS services to attack third...

Summary

Updated pdns-recursor packages fix security vulnerabilities:
An issue in the DNS protocol has been found that allow malicious parties to use recursive DNS services to attack third party authoritative name servers. The attack uses a crafted reply by an authoritative name server to amplify the resulting traffic between the recursive and other authoritative name servers. Both types of service can suffer degraded performance as an effect (CVE-2020-10995).
An issue has been found in PowerDNS Recursor 4.1.0 through 4.3.0 where records in the answer section of a NXDOMAIN response lacking an SOA were not properly validated in SyncRes::processAnswer. This would allow an attacker in position of man-in-the-middle to send a NXDOMAIN answer for a name that does exist, bypassing DNSSEC validation (CVE-2020-12244).

References

- https://bugs.mageia.org/show_bug.cgi?id=26645

- https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2020-01.html

- https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2020-02.html

- https://www.openwall.com/lists/oss-security/2020/05/19/3

- https://doc.powerdns.com/recursor/changelog/4.1.html#change-4.1.16

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10995

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12244

Resolution

MGASA-2020-0223 - Updated pdns-recursor packages fix security vulnerabilities

SRPMS

- 7/core/pdns-recursor-4.1.16-1.mga7

Severity
Publication date: 24 May 2020
URL: https://advisories.mageia.org/MGASA-2020-0223.html
Type: security
CVE: CVE-2020-10995, CVE-2020-12244

Related News