CVE-2019-10191
Summary
| CVE | CVE-2019-10191 |
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2019-07-16 18:15:00 UTC |
| Updated | 2023-02-12 23:33:00 UTC |
| Description | A vulnerability was discovered in DNS resolver of knot resolver before version 4.1.0 which allows remote attackers to downgrade DNSSEC-secure domains to DNSSEC-insecure state, opening possibility of domain hijack using attacks against insecure DNS protocol. |
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|
| [SECURITY] Fedora 30 Update: knot-resolver-4.1.0-1.fc30 - package-announce - Fedora Mailing-Lists |
FEDORA |
lists.fedoraproject.org |
Third Party Advisory |
| Knot Resolver 4.1.0 released – Knot Resolver |
CONFIRM |
www.knot-resolver.cz |
Release Notes, Vendor Advisory |
| [SECURITY] Fedora 30 Update: knot-resolver-4.1.0-1.fc30 - package-announce - Fedora Mailing-Lists |
MISC |
lists.fedoraproject.org |
|
| [SECURITY] Fedora 29 Update: knot-resolver-4.1.0-1.fc29 - package-announce - Fedora Mailing-Lists |
MISC |
lists.fedoraproject.org |
|
| [SECURITY] Fedora 29 Update: knot-resolver-4.1.0-1.fc29 - package-announce - Fedora Mailing-Lists |
FEDORA |
lists.fedoraproject.org |
Third Party Advisory |
| 1727211 – (CVE-2019-10191) CVE-2019-10191 knot-resolver: improper input validation in DNS resolver allows remote attacker to poison cache by unsigned negative answer |
CONFIRM |
bugzilla.redhat.com |
Issue Tracking, Third Party Advisory |
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 501027 Alpine Linux Security Update for knot-resolver