CVE-2020-10995
CVSS V2 Medium 5
CVSS V3 High 7.5
Description
PowerDNS Recursor from 4.1.0 up to and including 4.3.0 does not sufficiently defend against amplification attacks. An issue in the DNS protocol has been found that allow malicious parties to use recursive DNS services to attack third party authoritative name servers. The attack uses a crafted reply by an authoritative name server to amplify the resulting traffic between the recursive and other authoritative name servers. Both types of service can suffer degraded performance as an effect. This is triggered by random subdomains in the NSDNAME in NS records. PowerDNS Recursor 4.1.16, 4.2.2 and 4.3.1 contain a mitigation to limit the impact of this DNS protocol issue.
Overview
- CVE ID
- CVE-2020-10995
- Assigner
- cve@mitre.org
- Vulnerability Status
- Analyzed
- Published Version
- 2020-05-19T17:15:10
- Last Modified Date
- 2022-04-26T19:25:34
Weakness Enumerations
CPE Configuration (Product)
CPE | Vulnerable | Operator | Version Start | Version End |
---|---|---|---|---|
cpe:2.3:a:powerdns:recursor:*:*:*:*:*:*:*:* | 1 | OR | 4.1.0 | 4.3.0 |
cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:opensuse:backports_sle:15.0:sp1:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:* | 1 | OR |
CVSS Version 2
- Version
- 2.0
- Vector String
- AV:N/AC:L/Au:N/C:N/I:N/A:P
- Access Vector
- NETWORK
- Access Compatibility
- LOW
- Authentication
- NONE
- Confidentiality Impact
- NONE
- Integrity Impact
- NONE
- Availability Impact
- PARTIAL
- Base Score
- 5
- Severity
- MEDIUM
- Exploitability Score
- 10
- Impact Score
- 2.9
CVSS Version 3
- Version
- 3.1
- Vector String
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
- Attack Vector
- NETWORK
- Attack Compatibility
- LOW
- Privileges Required
- NONE
- User Interaction
- NONE
- Scope
- UNCHANGED
- Confidentiality Impact
- NONE
- Availability Impact
- HIGH
- Base Score
- 7.5
- Base Severity
- HIGH
- Exploitability Score
- 3.9
- Impact Score
- 3.6
References
Reference URL | Reference Tags |
---|---|
https://doc.powerdns.com/recursor/security-advisories/powerdns-advisory-2020-01.html | Vendor Advisory |
http://www.nxnsattack.com | Technical Description Third Party Advisory |
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00052.html | Mailing List Third Party Advisory |
https://www.debian.org/security/2020/dsa-4691 | Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NMP72NJGKBWR5WEBXAWX5KSLQUDFTG6S/ | Mailing List Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PS4ZN5XGENYNFKX7QIIOUCQQHXE37GJF/ | Mailing List Third Party Advisory |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2020-10995 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10995 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2022-05-10 06:26:14 | Added to TrackCVE | |||
2022-12-04 16:41:41 | 2020-05-19T17:15Z | 2020-05-19T17:15:10 | CVE Published Date | updated |
2022-12-04 16:41:41 | 2022-04-26T19:25:34 | CVE Modified Date | updated | |
2022-12-04 16:41:41 | Analyzed | Vulnerability Status | updated |