Vulnerability CVE-2019-10190


Published: 2019-07-16

Description:
A vulnerability was discovered in DNS resolver component of knot resolver through version 3.2.0 before 4.1.0 which allows remote attackers to bypass DNSSEC validation for non-existence answer. NXDOMAIN answer would get passed through to the client even if its DNSSEC validation failed, instead of sending a SERVFAIL packet. Caching is not affected by this particular bug but see CVE-2019-10191.

Type:

CWE-20

(Improper Input Validation)

CVSS2 => (AV:N/AC:L/Au:N/C:N/I:P/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
5/10
2.9/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
None
Partial
None
Affected software
Knot-resolver -> Knot resolver 

 References:
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10190
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TMSSWBHINIX4WE6UDXWM66L7JYEK6XS6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VZV5YZZ5766UIG2TFLFJL6EESQNAP5X5/
https://www.knot-resolver.cz/2019-07-10-knot-resolver-4.1.0.html

Copyright 2024, cxsecurity.com

 

Back to Top