Previous topic

PowerDNS Security Advisory 2018-06: Packet cache pollution via crafted query

Next topic

Upgrade Guide

This Page

PowerDNS Security Advisory 2018-07: Crafted query for meta-types can cause a denial of service

  • CVE: CVE-2018-14644
  • Date: November 6th 2018
  • Affects: PowerDNS Recursor from 4.0.0 up to and including 4.1.4
  • Not affected: 4.0.9, 4.1.5
  • Severity: Medium
  • Impact: Denial of service
  • Exploit: This problem can be triggered via crafted queries for some domains
  • Risk of system compromise: No
  • Solution: Upgrade to a non-affected version

An issue has been found in PowerDNS Recursor where a remote attacker sending a DNS query for a meta-type like OPT can lead to a zone being wrongly cached as failing DNSSEC validation. It only arises if the parent zone is signed, and all the authoritative servers for that parent zone answer with FORMERR to a query for at least one of the meta-types. As a result, subsequent queries from clients requesting DNSSEC validation will be answered with a ServFail.

This issue has been assigned CVE-2018-14644 by Red Hat.

PowerDNS Recursor from 4.0.0 up to and including 4.1.4 is affected.

We would like to thank Toshifumi Sakaguchi for finding and subsequently reporting this issue.