CVE-2020-25829
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
An issue has been found in PowerDNS Recursor before 4.1.18, 4.2.x before 4.2.5, and 4.3.x before 4.3.5. A remote attacker can cause the cached records for a given name to be updated to the Bogus DNSSEC validation state, instead of their actual DNSSEC Secure state, via a DNS ANY query. This results in a denial of service for installation that always validate (dnssec=validate), and for clients requesting validation when on-demand validation is enabled (dnssec=process).
Se ha encontrado un problema en PowerDNS Recursor versiones anteriores a 4.1.18, versiones 4.2.x anteriores a 4.2.5 y versiones 4.3.x anteriores a 4.3.5. Un atacante remoto puede causar que los registros en caché para un nombre dado sean actualizados al estado de comprobación de Bogus DNSSEC, en lugar de su estado DNSSEC Secure real, por medio de una consulta ANY de DNS. Esto resulta en una denegación de servicio para la instalación que siempre comprueba (dnssec=validate) y para los clientes que requieren comprobación cuando la comprobación bajo demanda está habilitada (dnssec=process)
CVSS Scores
SSVC
- Decision:-
Timeline
- 2020-09-23 CVE Reserved
- 2020-10-16 CVE Published
- 2024-08-04 CVE Updated
- 2024-08-20 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
CAPEC
References (3)
URL | Tag | Source |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Powerdns Search vendor "Powerdns" | Recursor Search vendor "Powerdns" for product "Recursor" | < 4.1.18 Search vendor "Powerdns" for product "Recursor" and version " < 4.1.18" | - |
Affected
| ||||||
Powerdns Search vendor "Powerdns" | Recursor Search vendor "Powerdns" for product "Recursor" | >= 4.2.0 < 4.2.5 Search vendor "Powerdns" for product "Recursor" and version " >= 4.2.0 < 4.2.5" | - |
Affected
| ||||||
Powerdns Search vendor "Powerdns" | Recursor Search vendor "Powerdns" for product "Recursor" | >= 4.3.0 < 4.3.5 Search vendor "Powerdns" for product "Recursor" and version " >= 4.3.0 < 4.3.5" | - |
Affected
| ||||||
Opensuse Search vendor "Opensuse" | Backports Sle Search vendor "Opensuse" for product "Backports Sle" | 15.0 Search vendor "Opensuse" for product "Backports Sle" and version "15.0" | sp1 |
Affected
| ||||||
Opensuse Search vendor "Opensuse" | Backports Sle Search vendor "Opensuse" for product "Backports Sle" | 15.0 Search vendor "Opensuse" for product "Backports Sle" and version "15.0" | sp2 |
Affected
| ||||||
Opensuse Search vendor "Opensuse" | Leap Search vendor "Opensuse" for product "Leap" | 15.1 Search vendor "Opensuse" for product "Leap" and version "15.1" | - |
Affected
| ||||||
Opensuse Search vendor "Opensuse" | Leap Search vendor "Opensuse" for product "Leap" | 15.2 Search vendor "Opensuse" for product "Leap" and version "15.2" | - |
Affected
|