{"id":"CVE-2020-12244","details":"An issue has been found in PowerDNS Recursor 4.1.0 through 4.3.0 where records in the answer section of a NXDOMAIN response lacking an SOA were not properly validated in SyncRes::processAnswer, allowing an attacker to bypass DNSSEC validation.","modified":"2026-04-16T04:37:15.343661655Z","published":"2020-05-19T14:15:11.097Z","related":["openSUSE-SU-2020:0698-1","openSUSE-SU-2024:11157-1"],"references":[{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NMP72NJGKBWR5WEBXAWX5KSLQUDFTG6S/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PS4ZN5XGENYNFKX7QIIOUCQQHXE37GJF/"},{"type":"ADVISORY","url":"https://www.debian.org/security/2020/dsa-4691"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00052.html"},{"type":"ADVISORY","url":"http://www.openwall.com/lists/oss-security/2020/05/19/3"},{"type":"ADVISORY","url":"https://doc.powerdns.com/recursor/security-advisories/powerdns-advisory-2020-02.html"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/powerdns/pdns","events":[{"introduced":"80da1b4773cbdad76755b01c70739059d6f607af"},{"last_affected":"f8e019026f5a1eff4b56a90a39c4acac95ae9dc4"}],"database_specific":{"versions":[{"introduced":"4.1.0"},{"last_affected":"4.3.0"}]}}],"versions":["auth-4.2.0-alpha1","auth-4.2.0-beta1","auth-4.2.0-rc1","auth-4.2.0-rc2","auth-4.3.0-alpha1","dnsdist-1.3.0","dnsdist-1.3.1","dnsdist-1.3.2","dnsdist-1.3.3","dnsdist-1.4.0","dnsdist-1.4.0-alpha1","dnsdist-1.4.0-alpha2","dnsdist-1.4.0-beta1","dnsdist-1.4.0-rc1","dnsdist-1.4.0-rc2","dnsdist-1.4.0-rc3","dnsdist-1.4.0-rc4","dnsdist-1.4.0-rc5","rec-4.1.0","rec-4.2.0-alpha1","rec-4.2.0-beta1","rec-4.2.0-rc1","rec-4.3.0","rec-4.3.0-alpha1","rec-4.3.0-alpha2","rec-4.3.0-alpha3","rec-4.3.0-beta1","rec-4.3.0-beta2","rec-4.3.0-rc1","rec-4.3.0-rc2"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2020-12244.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"31"}]},{"events":[{"introduced":"0"},{"last_affected":"32"}]},{"events":[{"introduced":"0"},{"last_affected":"10.0"}]},{"events":[{"introduced":"0"},{"last_affected":"15.0-sp1"}]},{"events":[{"introduced":"0"},{"last_affected":"15.1"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}]}