SynopsisThe remote name server is affected by a spoofing vulnerability.
DescriptionAccording to its self-reported version number, the version of the PowerDNS Recursor listening on the remote host is version 4.1.0. It is, therefore, affected by a flaw when handling DNSSEC signature validation of NSEC or NSEC3 records.
Note that Nessus has not attempted to exploit these issues but has instead relied only on the application's self-reported version number.
Also, Nessus has not checked for the presence of the patch.
SolutionUpgrade to PowerDNS Recursor 4.1.1 or later. Alternatively, apply the patches referenced in the vendor advisories.