PowerDNS Security Advisory 2018-07: Crafted query for meta-types can cause a denial of service ============================================================================================== - CVE: CVE-2018-14644 - Date: November 6th 2018 - Affects: PowerDNS Recursor from 4.0.0 up to and including 4.1.4 - Not affected: 4.0.9, 4.1.5 - Severity: Medium - Impact: Denial of service - Exploit: This problem can be triggered via crafted queries for some domains - Risk of system compromise: No - Solution: Upgrade to a non-affected version An issue has been found in PowerDNS Recursor where a remote attacker sending a DNS query for a meta-type like OPT can lead to a zone being wrongly cached as failing DNSSEC validation. It only arises if the parent zone is signed, and all the authoritative servers for that parent zone answer with FORMERR to a query for at least one of the meta-types. As a result, subsequent queries from clients requesting DNSSEC validation will be answered with a ServFail. This issue has been assigned CVE-2018-14644 by Red Hat. PowerDNS Recursor from 4.0.0 up to and including 4.1.4 is affected. We would like to thank Toshifumi Sakaguchi for finding and subsequently reporting this issue.