CVE-2019-3807
Summary
| CVE | CVE-2019-3807 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2019-01-29 17:29:00 UTC |
| Updated | 2019-10-09 23:49:00 UTC |
| Description | An issue has been found in PowerDNS Recursor versions 4.1.x before 4.1.9 where records in the answer section of responses received from authoritative servers with the AA flag not set were not properly validated, allowing an attacker to bypass DNSSEC validation. |
Risk And Classification
Problem Types: CWE-295
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| 1669151 – (CVE-2019-3807) CVE-2019-3807 pdns-recursor: Insufficient validation of DNSSEC signature | CONFIRM | bugzilla.redhat.com | Issue Tracking, Third Party Advisory |
| PowerDNS Security Advisory 2019-02: Insufficient validation of DNSSEC signatures — PowerDNS Recursor documentation | CONFIRM | docs.powerdns.com | Vendor Advisory |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.