A vulnerability was discovered in DNS resolver of knot resolver before version 4.1.0 which allows remote attackers to downgrade DNSSEC-secure domains to DNSSEC-insecure state, opening possibility of domain hijack using attacks against insecure DNS protocol.
References
Configurations
History
21 Nov 2024, 04:18
Type | Values Removed | Values Added |
---|---|---|
References | () https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10191 - Issue Tracking, Third Party Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2024/04/msg00017.html - | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TMSSWBHINIX4WE6UDXWM66L7JYEK6XS6/ - | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VZV5YZZ5766UIG2TFLFJL6EESQNAP5X5/ - | |
References | () https://www.knot-resolver.cz/2019-07-10-knot-resolver-4.1.0.html - Release Notes, Vendor Advisory |
26 Apr 2024, 07:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
Information
Published : 2019-07-16 18:15
Updated : 2024-11-21 04:18
NVD link : CVE-2019-10191
Mitre link : CVE-2019-10191
CVE.ORG link : CVE-2019-10191
JSON object : View
Products Affected
nic
- knot_resolver
fedoraproject
- fedora
CWE
CWE-20
Improper Input Validation