Upstream information

CVE-2017-15090 at MITRE

Description

An issue has been found in the DNSSEC validation component of PowerDNS Recursor from 4.0.0 and up to and including 4.0.6, where the signatures might have been accepted as valid even if the signed data was not in bailiwick of the DNSKEY used to sign it. This allows an attacker in position of man-in-the-middle to alter the content of records by issuing a valid signature for the crafted records.

SUSE information

Overall state of this security issue: Does not affect SUSE products

This issue is currently rated as having moderate severity.

CVSS v2 Scores
  National Vulnerability Database
Base Score 4.3
Vector AV:N/AC:M/Au:N/C:N/I:P/A:N
Access Vector Network
Access Complexity Medium
Authentication None
Confidentiality Impact None
Integrity Impact Partial
Availability Impact None
SUSE Bugzilla entry: 1069242 [RESOLVED / FIXED]

SUSE Security Advisories:

List of released packages

Product(s) Fixed package version(s) References
openSUSE Leap 42.2
  • pdns-recursor >= 3.7.3-9.3.1
  • pdns-recursor-debuginfo >= 3.7.3-9.3.1
  • pdns-recursor-debugsource >= 3.7.3-9.3.1
Patchnames:
openSUSE-2017-1339
openSUSE Leap 42.3
  • pdns-recursor >= 4.0.5-3.1
  • pdns-recursor-debuginfo >= 4.0.5-3.1
  • pdns-recursor-debugsource >= 4.0.5-3.1
Patchnames:
openSUSE-2017-1339