cvelist/2019/3xxx/CVE-2019-3807.json

78 lines
2.2 KiB
JSON
Raw Normal View History

2019-01-03 14:05:09 -05:00
{
2019-01-29 12:04:33 -05:00
"CVE_data_meta" : {
"ASSIGNER" : "psampaio@redhat.com",
"ID" : "CVE-2019-3807",
"STATE" : "PUBLIC"
},
"affects" : {
"vendor" : {
"vendor_data" : [
2019-01-29 09:31:46 -03:00
{
2019-01-29 12:04:33 -05:00
"product" : {
"product_data" : [
{
"product_name" : "pdns-recursor",
"version" : {
"version_data" : [
{
"version_value" : "versions 4.1.x before 4.1.9"
}
]
}
}
]
},
"vendor_name" : "Power DNS"
2019-01-28 18:44:06 -03:00
}
2019-01-29 12:04:33 -05:00
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "An issue has been found in PowerDNS Recursor versions 4.1.x before 4.1.9 where records in the answer section of responses received from authoritative servers with the AA flag not set were not properly validated, allowing an attacker to bypass DNSSEC validation."
}
]
},
"impact" : {
"cvss" : [
[
2019-01-28 18:44:06 -03:00
{
2019-01-29 12:04:33 -05:00
"vectorString" : "3.7/CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N",
"version" : "3.0"
2019-01-28 18:44:06 -03:00
}
2019-01-29 12:04:33 -05:00
]
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "CWE-345"
}
2019-01-28 18:44:06 -03:00
]
2019-01-29 12:04:33 -05:00
}
]
},
"references" : {
"reference_data" : [
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3807",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3807"
},
{
"name" : "https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2019-02.html",
"refsource" : "CONFIRM",
"url" : "https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2019-02.html"
}
]
}
2019-01-03 14:05:09 -05:00
}