An issue has been found in PowerDNS Recursor 4.1.0 through 4.3.0 where records in the answer section of a NXDOMAIN response lacking an SOA were not properly validated in SyncRes::processAnswer, allowing an attacker to bypass DNSSEC validation. Reference:

Created pdns-recursor tracking bugs for this….



Source link

Write a comment:
*

Your email address will not be published.