CVE-2016-7074

Priority
Description
An issue has been found in PowerDNS before 3.4.11 and 4.0.2, and PowerDNS
recursor before 4.0.4, allowing an attacker in position of
man-in-the-middle to alter the content of an AXFR because of insufficient
validation of TSIG signatures. A missing check that the TSIG record is the
last one, leading to the possibility of parsing records that are not
covered by the TSIG signature.
Notes
Package
Source: pdns (LP Ubuntu Debian)
Upstream:released (4.0.2-1)
Ubuntu 12.04 ESM (Precise Pangolin):DNE (precise was needs-triage)
Ubuntu 14.04 ESM (Trusty Tahr):DNE (trusty was needed)
Ubuntu 16.04 LTS (Xenial Xerus):needed
Ubuntu 18.04 LTS (Bionic Beaver):not-affected (4.0.2-1)
Ubuntu 20.04 LTS (Focal Fossa):not-affected (4.0.2-1)
Ubuntu 20.10 (Groovy Gorilla):not-affected (4.0.2-1)
Package
Upstream:released (4.0.4-1)
Ubuntu 12.04 ESM (Precise Pangolin):DNE (precise was needs-triage)
Ubuntu 14.04 ESM (Trusty Tahr):DNE (trusty was not-affected)
Ubuntu 16.04 LTS (Xenial Xerus):needed
Ubuntu 18.04 LTS (Bionic Beaver):not-affected (4.0.4-1)
Ubuntu 20.04 LTS (Focal Fossa):not-affected (4.0.4-1)
Ubuntu 20.10 (Groovy Gorilla):not-affected (4.0.4-1)
More Information

Updated: 2020-09-09 20:53:12 UTC (commit b67d7d8b03f173f825cd706df5bd078bca500b0e)