Upstream information

CVE-2020-14196 at MITRE

Description

In PowerDNS Recursor versions up to and including 4.3.1, 4.2.2 and 4.1.16, the ACL restricting access to the internal web server is not properly enforced.

SUSE information

Overall state of this security issue: Pending

This issue is currently rated as having moderate severity.

CVSS v2 Scores
  National Vulnerability Database
Base Score 4.3
Vector AV:N/AC:M/Au:N/C:N/I:P/A:N
Access Vector Network
Access Complexity Medium
Authentication None
Confidentiality Impact None
Integrity Impact Partial
Availability Impact None
CVSS v3 Scores
  National Vulnerability Database SUSE
Base Score 5.3 4.3
Vector CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
Attack Vector Network Network
Attack Complexity Low Low
Privileges Required None Low
User Interaction None None
Scope Unchanged Unchanged
Confidentiality Impact None None
Integrity Impact Low Low
Availability Impact None None
CVSSv3 Version 3.1 3.1
SUSE Bugzilla entry: 1173302 [RESOLVED / FIXED]

SUSE Security Advisories:

List of released packages

Product(s) Fixed package version(s) References
SUSE Package Hub 12 SP1
  • pdns-recursor >= 4.1.18-25.1
Patchnames:
openSUSE-2020-1005
openSUSE-2020-1687
SUSE Package Hub 15 SP1
  • pdns-recursor >= 4.1.12-bp151.4.9.1
Patchnames:
openSUSE-2020-1005
openSUSE-2020-1687
SUSE Package Hub 15 SP2
  • pdns-recursor >= 4.3.5-bp152.2.12.1
Patchnames:
openSUSE-2020-1055
openSUSE-2020-1101
openSUSE-2020-1687
openSUSE Leap 15.1
  • pdns-recursor >= 4.1.12-lp151.3.9.1
Patchnames:
openSUSE-2020-1005
openSUSE-2020-1687
openSUSE Leap 15.2
  • pdns-recursor >= 4.3.5-lp152.2.6.1
Patchnames:
openSUSE-2020-1005
openSUSE-2020-1687
openSUSE Tumbleweed
  • pdns-recursor >= 4.5.5-1.3
Patchnames:
openSUSE-Tumbleweed-2024-11157


SUSE Timeline for this CVE

CVE page created: Wed Jun 24 11:08:41 2020
CVE page last modified: Tue Sep 3 19:16:38 2024