SB2020092804 - Multiple vulnerabilities in PowerDNS Authoritative server



SB2020092804 - Multiple vulnerabilities in PowerDNS Authoritative server

Published: September 28, 2020 Updated: February 7, 2021

Security Bulletin ID SB2020092804
Severity
Medium
Patch available
YES
Number of vulnerabilities 3
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

Medium 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 3 secuirty vulnerabilities.


1) Race condition (CVE-ID: CVE-2020-24696)

The vulnerability allows a remote attacker to compromise the affected system.

The vulnerability exists due to a race condition when processing queries with a GSS-TSIG signature. A remote attacker can exploit the race and crash the server or execute arbitrary code on the system.

Successful exploitation of the vulnerability requires that the application is compiled with –enable-experimental-gss-tsig flag.


2) Input validation error (CVE-ID: CVE-2020-24697)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to insufficient validation of user-supplied input when pressing queries with a GSS-TSIG signature. A remote attacker can pass specially crafted DNS query to the application and perform a denial of service (DoS) attack.

Successful exploitation of the vulnerability requires that the application is compiled with –enable-experimental-gss-tsig flag.


3) Double Free (CVE-ID: CVE-2020-24698)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error when processing queries with a GSS-TSIG signature. A remote attacker can pass specially crafted DNS query to the application, trigger double free error and execute arbitrary code on the target system.

Successful exploitation of the vulnerability requires that the application is compiled with –enable-experimental-gss-tsig flag.


Remediation

Install update from vendor's website.