SB2020092804 - Multiple vulnerabilities in PowerDNS Authoritative server
Published: September 28, 2020 Updated: February 7, 2021
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 3 secuirty vulnerabilities.
1) Race condition (CVE-ID: CVE-2020-24696)
The vulnerability allows a remote attacker to compromise the affected system.
The vulnerability exists due to a race condition when processing queries with a GSS-TSIG signature. A remote attacker can exploit the race and crash the server or execute arbitrary code on the system.
Successful exploitation of the vulnerability requires that the application is compiled with –enable-experimental-gss-tsig flag.
2) Input validation error (CVE-ID: CVE-2020-24697)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input when pressing queries with a GSS-TSIG signature. A remote attacker can pass specially crafted DNS query to the application and perform a denial of service (DoS) attack.
Successful exploitation of the vulnerability requires that the application is compiled with –enable-experimental-gss-tsig flag.
3) Double Free (CVE-ID: CVE-2020-24698)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error when processing queries with a GSS-TSIG signature. A remote attacker can pass specially crafted DNS query to the application, trigger double free error and execute arbitrary code on the target system.
Successful exploitation of the vulnerability requires that the application is compiled with –enable-experimental-gss-tsig flag.
Remediation
Install update from vendor's website.