Improper Input Validation in PowerDNS Version 4.1.0
CVE-2018-1000003
3.7LOW
Summary
In PowerDNS version 4.1.0, flaws in the input validation mechanisms of the DNSSEC components permit an attacker in a man-in-the-middle position to manipulate DNS responses. By utilizing packet replay techniques, the attacker can falsely deny the existence of certain DNS records, leading to potential disruptions in connectivity and reliability of DNS data. This vulnerability highlights the critical importance of robust validation processes within DNS infrastructure.
References
CVSS V3.1
Score:
3.7
Severity:
LOW
Confidentiality:
None
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved