An issue has been found in PowerDNS Recursor where a remote attacker sending a DNS query for a meta-type like OPT can lead to a zone being wrongly cached as failing DNSSEC validation. It only arises if the parent zone is signed, and all the authoritative servers for that parent zone answer with FORMERR to a query for at least one of the meta-types. As a result, subsequent queries from clients requesting DNSSEC validation will be answered with a ServFail.
This issue has been assigned CVE-2018-14644 by Red Hat.
PowerDNS Recursor from 4.0.0 up to and including 4.1.4 is affected.
We would like to thank Toshifumi Sakaguchi for finding and subsequently reporting this issue.