An issue has been found in PowerDNS Recursor before 4.1.18, 4.2.x before 4.2.5, and 4.3.x before 4.3.5. A remote attacker can cause the cached records for a given name to be updated to the Bogus DNSSEC validation state, instead of their actual DNSSEC Secure state, via a DNS ANY query. This results in a denial of service for installation that always validate (dnssec=validate), and for clients requesting validation when on-demand validation is enabled (dnssec=process).
{ "vanir_signatures": [ { "signature_version": "v1", "digest": { "length": 729.0, "function_hash": "77679631441445527983920042920211549080" }, "source": "https://github.com/powerdns/pdns/commit/77409aab0be43071b365760213894d6388c3df30", "deprecated": false, "target": { "file": "pdns/recursor_cache.cc", "function": "MemRecursorCache::updateValidationStatus" }, "signature_type": "Function", "id": "CVE-2020-25829-ac387b1a" }, { "signature_version": "v1", "digest": { "threshold": 0.9, "line_hashes": [ "47417538831777855470350430050715081350", "148055263521903558314326114750883219758", "35080228024880871007699290772856527215", "67316773013314591480806366431856137347", "117026657073042240224421905896698093643", "323213353731232169172399806756170124246", "155500896485175737294500301755246166961", "224196667708172987418133306458664934984", "144653575526639387313445865962482611461", "103108929300239247840240085865274340062", "32309045751000532166148983162358670769", "252546257047801208426498952786257063949" ] }, "source": "https://github.com/powerdns/pdns/commit/77409aab0be43071b365760213894d6388c3df30", "deprecated": false, "target": { "file": "pdns/recursor_cache.cc" }, "signature_type": "Line", "id": "CVE-2020-25829-e5cd83e1" } ] }