vulnerability
Arch Linux: Insufficient validation (CVE-2019-3807)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 6 | (AV:N/AC:L/Au:N/C:P/I:P/A:N) | Jan 29, 2019 | Jul 11, 2025 | Nov 27, 2025 |
Severity
6
CVSS
(AV:N/AC:L/Au:N/C:P/I:P/A:N)
Published
Jan 29, 2019
Added
Jul 11, 2025
Modified
Nov 27, 2025
Description
An issue has been found in PowerDNS Recursor before 4.1.9 where records in the answer section of responses received from authoritative servers with the AA flag not set were not properly validated, allowing an attacker to bypass DNSSEC validation.
Solution
arch-linux-upgrade-latest
References
- CVE-2019-3807
- https://attackerkb.com/topics/CVE-2019-3807
- URL-https://blog.powerdns.com/2019/01/21/powerdns-recursor-4-1-9-released/
- URL-https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3807
- URL-https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2019-02.html
- URL-https://security.archlinux.org/ASA-201901-13
- CWE-345
- CWE-295
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.