7.5
CVE-2019-10190
- EPSS 0.26%
- Veröffentlicht 16.07.2019 18:15:12
- Zuletzt bearbeitet 21.11.2024 04:18:37
- Quelle secalert@redhat.com
- CVE-Watchlists
- Unerledigt
A vulnerability was discovered in DNS resolver component of knot resolver through version 3.2.0 before 4.1.0 which allows remote attackers to bypass DNSSEC validation for non-existence answer. NXDOMAIN answer would get passed through to the client even if its DNSSEC validation failed, instead of sending a SERVFAIL packet. Caching is not affected by this particular bug but see CVE-2019-10191.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Nic ≫ Knot Resolver Version <= 3.2.0
Nic ≫ Knot Resolver Version >= 4.0.0 < 4.1.0
Fedoraproject ≫ Fedora Version29
Fedoraproject ≫ Fedora Version30
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.26% | 0.493 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 7.5 | 3.9 | 3.6 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
|
| nvd@nist.gov | 5 | 10 | 2.9 |
AV:N/AC:L/Au:N/C:N/I:P/A:N
|
| secalert@redhat.com | 5.4 | 2.8 | 2.5 |
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
|
CWE-20 Improper Input Validation
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.