First published: Tue Jul 16 2019(Updated: )
A vulnerability was discovered in DNS resolver of knot resolver before version 4.1.0 which allows remote attackers to downgrade DNSSEC-secure domains to DNSSEC-insecure state, opening possibility of domain hijack using attacks against insecure DNS protocol.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Nic Knot Resolver | <4.1.0 | |
Fedoraproject Fedora | =29 | |
Fedoraproject Fedora | =30 | |
debian/knot-resolver | 5.3.1-1+deb11u1 5.6.0-1+deb12u1 5.7.4-2 | |
<4.1.0 | ||
=29 | ||
=30 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-10191 is a vulnerability discovered in DNS resolver of Knot Resolver before version 4.1.0.
CVE-2019-10191 allows remote attackers to downgrade DNSSEC-secure domains to DNSSEC-insecure state, opening the possibility of domain hijack using attacks against insecure DNS protocol.
CVE-2019-10191 has a severity rating of 7.5 (high).
Knot Resolver versions before 4.1.0, Fedora 29, and Fedora 30 are affected by CVE-2019-10191.
To fix CVE-2019-10191, update Knot Resolver to version 4.1.0 or later, or upgrade to a non-vulnerable version of Fedora.