1
Candidate: CVE-2017-15090
4
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15090
5
https://doc.powerdns.com/recursor/security-advisories/powerdns-advisory-2017-03.html
6
https://downloads.powerdns.com/patches/2017-03/
8
An issue has been found in the DNSSEC validation component of PowerDNS
9
Recursor from 4.0.0 and up to and including 4.0.6, where the signatures
10
might have been accepted as valid even if the signed data was not in
11
bailiwick of the DNSKEY used to sign it. This allows an attacker in
12
position of man-in-the-middle to alter the content of records by issuing a
13
valid signature for the crafted records.
22
Patches_pdns-recursor:
23
upstream_pdns-recursor: released (4.0.7-1)
24
precise/esm_pdns-recursor: DNE
25
trusty_pdns-recursor: needs-triage
26
xenial_pdns-recursor: needs-triage
27
zesty_pdns-recursor: ignored (reached end-of-life)
28
artful_pdns-recursor: needs-triage
29
bionic_pdns-recursor: needs-triage
30
devel_pdns-recursor: needs-triage