Improper Input Validation in PowerDNS Version 4.1.0
CVE-2018-1000003

3.7LOW

Key Information:

Vendor
Powerdns
Status
Vendor
CVE Published:
22 January 2018

Summary

In PowerDNS version 4.1.0, flaws in the input validation mechanisms of the DNSSEC components permit an attacker in a man-in-the-middle position to manipulate DNS responses. By utilizing packet replay techniques, the attacker can falsely deny the existence of certain DNS records, leading to potential disruptions in connectivity and reliability of DNS data. This vulnerability highlights the critical importance of robust validation processes within DNS infrastructure.

References

CVSS V3.1

Score:
3.7
Severity:
LOW
Confidentiality:
None
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.