SynopsisThe remote name server is affected by multiple vulnerabilities.
DescriptionAccording to its self-reported version number, the version of the PowerDNS Recursor listening on the remote host is version 4.0.x prior to 4.0.7. It is, therefore, affected by multiple vulnerabilities:
- Insufficient validation of DNSSEC signatures.
- Cross-Site Scripting (XSS) in the web interface.
- Memory leak in DNSSEC parsing. (CVE-2017-15094)
Note that Nessus has not attempted to exploit these issues but has instead relied only on the application's self-reported version number.
Also, Nessus has not checked for the presence of the patch.
SolutionUpgrade to PowerDNS Recursor 4.0.7 or later. Alternatively, apply the patches referenced in the vendor advisories.