Vulnerability CVE-2016-7074


Published: 2018-09-11

Description:
An issue has been found in PowerDNS before 3.4.11 and 4.0.2, and PowerDNS recursor before 4.0.4, allowing an attacker in position of man-in-the-middle to alter the content of an AXFR because of insufficient validation of TSIG signatures. A missing check that the TSIG record is the last one, leading to the possibility of parsing records that are not covered by the TSIG signature.

Type:

CWE-20

(Improper Input Validation)

CVSS2 => (AV:N/AC:M/Au:N/C:N/I:P/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
4.3/10
2.9/10
8.6/10
Exploit range
Attack complexity
Authentication
Remote
Medium
No required
Confidentiality impact
Integrity impact
Availability impact
None
Partial
None
Affected software
Powerdns -> Authoritative 
Powerdns -> Recursor 
Debian -> Debian linux 

 References:
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-7074
https://doc.powerdns.com/md/security/powerdns-advisory-2016-04/
https://www.debian.org/security/2017/dsa-3764

Copyright 2024, cxsecurity.com

 

Back to Top