Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2025-30192

Опубликовано: 21 июл. 2025
Источник: debian
EPSS Низкий

Описание

An attacker spoofing answers to ECS enabled requests sent out by the Recursor has a chance of success higher than non-ECS enabled queries. The updated version include various mitigations against spoofing attempts of ECS enabled queries by chaining ECS enabled requests and enforcing stricter validation of the received answers. The most strict mitigation done when the new setting outgoing.edns_subnet_harden (old style name edns-subnet-harden) is enabled.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
pdns-recursorfixed5.2.4-1experimentalpackage
pdns-recursorfixed5.2.4-2package
pdns-recursorend-of-lifebookwormpackage
pdns-recursorend-of-lifebullseyepackage

Примечания

  • https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2025-04.html

EPSS

Процентиль: 4%
0.00019
Низкий

Связанные уязвимости

CVSS3: 7.5
ubuntu
4 месяца назад

An attacker spoofing answers to ECS enabled requests sent out by the Recursor has a chance of success higher than non-ECS enabled queries. The updated version include various mitigations against spoofing attempts of ECS enabled queries by chaining ECS enabled requests and enforcing stricter validation of the received answers. The most strict mitigation done when the new setting outgoing.edns_subnet_harden (old style name edns-subnet-harden) is enabled.

CVSS3: 7.5
nvd
4 месяца назад

An attacker spoofing answers to ECS enabled requests sent out by the Recursor has a chance of success higher than non-ECS enabled queries. The updated version include various mitigations against spoofing attempts of ECS enabled queries by chaining ECS enabled requests and enforcing stricter validation of the received answers. The most strict mitigation done when the new setting outgoing.edns_subnet_harden (old style name edns-subnet-harden) is enabled.

CVSS3: 7.5
redos
около 2 месяцев назад

Уязвимость pdns-recursor

CVSS3: 7.5
github
4 месяца назад

An attacker spoofing answers to ECS enabled requests sent out by the Recursor has a chance of success higher than non-ECS enabled queries. The updated version include various mitigations against spoofing attempts of ECS enabled queries by chaining ECS enabled requests and enforcing stricter validation of the received answers. The most strict mitigation done when the new setting outgoing.edns_subnet_harden (old style name edns-subnet-harden) is enabled.

CVSS3: 7.5
fstec
4 месяца назад

Уязвимость DNS-сервера PowerDNS Recursor, связанная с недостаточной проверкой подлинности данных, позволяющая нарушителю проводить спуфинг-атаки

EPSS

Процентиль: 4%
0.00019
Низкий