First published: Wed Oct 30 2019(Updated: )
** DISPUTED ** systemd 239 through 245 accepts any certificate signed by a trusted certificate authority for DNS Over TLS. Server Name Indication (SNI) is not sent, and there is no hostname validation with the GnuTLS backend. NOTE: This has been disputed by the developer as not a vulnerability since hostname validation does not have anything to do with this issue (i.e. there is no hostname to be sent).
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Systemd Project Systemd | >=239<244 | |
Fedoraproject Fedora | =31 | |
>=239<244 | ||
=31 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-21029 is a vulnerability in systemd versions 239 through 245 that allows the acceptance of any certificate signed by a trusted certificate authority for DNS Over TLS without proper hostname validation.
Yes, CVE-2018-21029 has a severity keyword of 'critical' and a severity value of 9.8.
CVE-2018-21029 affects systemd versions 239 through 245 and allows the acceptance of any certificate signed by a trusted certificate authority for DNS Over TLS without proper hostname validation.
The impact of CVE-2018-21029 is that an attacker could use a malicious certificate to perform man-in-the-middle attacks on DNS traffic.
To mitigate CVE-2018-21029, it is recommended to update systemd to a version that includes the fix for the vulnerability.