An issue has been found in PowerDNS before 3.4.11 and 4.0.2, and PowerDNS recursor before 4.0.4, allowing an attacker in position of man-in-the-middle to alter the content of an AXFR because of insufficient validation of TSIG signatures. A missing check that the TSIG record is the last one, leading to the possibility of parsing records that are not covered by the TSIG signature.
{
"unresolved_ranges": [
{
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "8.0"
}
],
"cpe": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
}
]
}{
"source": "CPE_FIELD",
"extracted_events": [
{
"introduced": "0"
},
{
"fixed": "3.4.11"
},
{
"fixed": "4.0.4"
},
{
"introduced": "4.0.0"
},
{
"fixed": "4.0.2"
}
],
"cpe": [
"cpe:2.3:a:powerdns:authoritative:*:*:*:*:*:*:*:*",
"cpe:2.3:a:powerdns:recursor:*:*:*:*:*:*:*:*"
]
}