CVE-2020-10995
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
PowerDNS Recursor from 4.1.0 up to and including 4.3.0 does not sufficiently defend against amplification attacks. An issue in the DNS protocol has been found that allow malicious parties to use recursive DNS services to attack third party authoritative name servers. The attack uses a crafted reply by an authoritative name server to amplify the resulting traffic between the recursive and other authoritative name servers. Both types of service can suffer degraded performance as an effect. This is triggered by random subdomains in the NSDNAME in NS records. PowerDNS Recursor 4.1.16, 4.2.2 and 4.3.1 contain a mitigation to limit the impact of this DNS protocol issue.
PowerDNS Recursor versiones desde 4.1.0 hasta 4.3.0 e incluyéndola, no defiende suficientemente contra los ataques de amplificación. Ha sido encontrado un problema en el protocolo DNS que permite a las partes maliciosas usar servicios DNS recursivos para atacar servidores de nombres autorizados por terceros. El ataque usa una respuesta diseñada por un servidor de nombres autorizados para amplificar el tráfico resultante entre los servidores de nombres recursivos y otros. Ambos tipos de servicio pueden sufrir un rendimiento degradado como un efecto. Esto es activado por subdominios aleatorios en NSDNAME en registros NS. PowerDNS Recursor versiones 4.1.16, 4.2.2 y 4.3.1, contienen una mitigación para limitar el impacto de este problema del protocolo DNS.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2020-03-27 CVE Reserved
- 2020-05-19 CVE Published
- 2024-08-04 CVE Updated
- 2024-09-12 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-400: Uncontrolled Resource Consumption
CAPEC
References (6)
URL | Tag | Source |
---|---|---|
http://www.nxnsattack.com | Technical Description |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Powerdns Search vendor "Powerdns" | Recursor Search vendor "Powerdns" for product "Recursor" | >= 4.1.0 <= 4.3.0 Search vendor "Powerdns" for product "Recursor" and version " >= 4.1.0 <= 4.3.0" | - |
Affected
| ||||||
Fedoraproject Search vendor "Fedoraproject" | Fedora Search vendor "Fedoraproject" for product "Fedora" | 31 Search vendor "Fedoraproject" for product "Fedora" and version "31" | - |
Affected
| ||||||
Fedoraproject Search vendor "Fedoraproject" | Fedora Search vendor "Fedoraproject" for product "Fedora" | 32 Search vendor "Fedoraproject" for product "Fedora" and version "32" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 10.0 Search vendor "Debian" for product "Debian Linux" and version "10.0" | - |
Affected
| ||||||
Opensuse Search vendor "Opensuse" | Backports Sle Search vendor "Opensuse" for product "Backports Sle" | 15.0 Search vendor "Opensuse" for product "Backports Sle" and version "15.0" | sp1 |
Affected
| ||||||
Opensuse Search vendor "Opensuse" | Leap Search vendor "Opensuse" for product "Leap" | 15.1 Search vendor "Opensuse" for product "Leap" and version "15.1" | - |
Affected
|