Vulnerability Details : CVE-2019-10190
A vulnerability was discovered in DNS resolver component of knot resolver through version 3.2.0 before 4.1.0 which allows remote attackers to bypass DNSSEC validation for non-existence answer. NXDOMAIN answer would get passed through to the client even if its DNSSEC validation failed, instead of sending a SERVFAIL packet. Caching is not affected by this particular bug but see CVE-2019-10191.
Vulnerability category: Input validation
Products affected by CVE-2019-10190
- cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
- cpe:2.3:a:nic:knot_resolver:*:*:*:*:*:*:*:*
- cpe:2.3:a:nic:knot_resolver:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2019-10190
0.33%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 71 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2019-10190
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:P/A:N |
10.0
|
2.9
|
NIST | |
5.4
|
MEDIUM | CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N |
2.8
|
2.5
|
Red Hat, Inc. | |
7.5
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N |
3.9
|
3.6
|
NIST |
CWE ids for CVE-2019-10190
-
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.Assigned by:
- nvd@nist.gov (Secondary)
- secalert@redhat.com (Primary)
References for CVE-2019-10190
-
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VZV5YZZ5766UIG2TFLFJL6EESQNAP5X5/
[SECURITY] Fedora 30 Update: knot-resolver-4.1.0-1.fc30 - package-announce - Fedora Mailing-Lists
-
https://lists.debian.org/debian-lts-announce/2024/04/msg00017.html
[SECURITY] [DLA 3795-1] knot-resolver security update
-
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10190
1727208 – (CVE-2019-10190) CVE-2019-10190 knot-resolver: improper input validation in DNS resolver allows remote attacker to bypass DNSSEC validationIssue Tracking;Third Party Advisory
-
https://www.knot-resolver.cz/2019-07-10-knot-resolver-4.1.0.html
Knot Resolver 4.1.0 released – Knot ResolverRelease Notes;Vendor Advisory
-
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TMSSWBHINIX4WE6UDXWM66L7JYEK6XS6/
[SECURITY] Fedora 29 Update: knot-resolver-4.1.0-1.fc29 - package-announce - Fedora Mailing-Lists
Jump to