Versio.io

CVE-2020-10995

Common vulnerabilities & exposures (CVE)

CVE databaseCVE database blogpostRelease & EoL database
 
Published at: - 19-05-2020 07:15
Last modified: - 26-04-2022 09:25
Total changes: - 3

Description

PowerDNS Recursor from 4.1.0 up to and including 4.3.0 does not sufficiently defend against amplification attacks. An issue in the DNS protocol has been found that allow malicious parties to use recursive DNS services to attack third party authoritative name servers. The attack uses a crafted reply by an authoritative name server to amplify the resulting traffic between the recursive and other authoritative name servers. Both types of service can suffer degraded performance as an effect. This is triggered by random subdomains in the NSDNAME in NS records. PowerDNS Recursor 4.1.16, 4.2.2 and 4.3.1 contain a mitigation to limit the impact of this DNS protocol issue.

Common Vulnerability Scoring System (CVSS)

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Low
Attack complexity
Network
Attack vector
High
Availability
None
Confidentiality
None
Integrity
None
Privileges required
Unchanged
Scope
None
User interaction
7.5
Base score
3.9
3.6
Exploitability score
Impact score
 

Verification logic

OR
OR
vendor=powerdns AND product=recursor AND versionEndIncluding=4.3.0 AND versionStartIncluding=4.1.0
OR
vendor=fedoraproject AND product=fedora AND version=31
vendor=fedoraproject AND product=fedora AND version=32
OR
vendor=Debian AND product=debian_linux AND version=10.0
OR
vendor=opensuse AND product=backports_sle AND version=15.0 AND update=sp1
vendor=opensuse AND product=leap AND version=15.1
 

Reference

 


Keywords

NVD

 

CVE-2020-10995

 

CVE

 

Common vulnerabilities & exposures

 

CVSS

 

Common vulnerability scoring system

 

Security

 

Vulnerabilities

 

Exposures

 

We use cookies to ensure that we give you the best experience on our website. Read privacy policies for more information.