CVE-2018-14663

Priority
Description
An issue has been found in PowerDNS DNSDist before 1.3.3 allowing a remote
attacker to craft a DNS query with trailing data such that the addition of
a record by dnsdist, for example an OPT record when adding EDNS Client
Subnet, might result in the trailing data being smuggled to the backend as
a valid record while not seen by dnsdist. This is an issue when dnsdist is
deployed as a DNS Firewall and used to filter some records that should not
be received by the backend. This issue occurs only when either the
'useClientSubnet' or the experimental 'addXPF' parameters are used when
declaring a new backend.
Package
Upstream:needs-triage
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 LTS (Trusty Tahr):DNE
Ubuntu 16.04 LTS (Xenial Xerus):needs-triage
Ubuntu 18.04 LTS (Bionic Beaver):needs-triage
Ubuntu 18.10 (Cosmic Cuttlefish):needs-triage
Ubuntu 19.04 (Disco Dingo):needs-triage
More Information

Updated: 2018-11-28 15:14:33 UTC (commit 4fe8950e2e4a010e7c3c77e19dd45140db170f05)