First published: Tue Jul 16 2019(Updated: )
A vulnerability was discovered in DNS resolver component of knot resolver through version 3.2.0 before 4.1.0 which allows remote attackers to bypass DNSSEC validation for non-existence answer. NXDOMAIN answer would get passed through to the client even if its DNSSEC validation failed, instead of sending a SERVFAIL packet. Caching is not affected by this particular bug but see CVE-2019-10191.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Nic Knot Resolver | <=3.2.0 | |
Nic Knot Resolver | >=4.0.0<4.1.0 | |
Fedoraproject Fedora | =29 | |
Fedoraproject Fedora | =30 | |
debian/knot-resolver | 5.3.1-1+deb11u1 5.6.0-1+deb12u1 5.7.4-2 | |
<=3.2.0 | ||
>=4.0.0<4.1.0 | ||
=29 | ||
=30 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2019-10190.
CVE-2019-10190 has a severity level of high, with a severity value of 7.5.
Knot Resolver versions up to and including 3.2.0, as well as Knot Resolver versions 4.0.0 to 4.1.0, are affected by CVE-2019-10190.
CVE-2019-10190 allows remote attackers to bypass DNSSEC validation for non-existence answers, potentially leading to DNS spoofing or other types of attacks.
Yes, for more information about CVE-2019-10190, you can refer to the following resources: - [Red Hat Bugzilla](https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10190) - [Fedora Project Message 1](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TMSSWBHINIX4WE6UDXWM66L7JYEK6XS6/) - [Fedora Project Message 2](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VZV5YZZ5766UIG2TFLFJL6EESQNAP5X5/)