Description
A vulnerability was discovered in DNS resolver component of knot resolver through version 3.2.0 before 4.1.0 which allows remote attackers to bypass DNSSEC validation for non-existence answer. NXDOMAIN answer would get passed through to the client even if its DNSSEC validation failed, instead of sending a SERVFAIL packet. Caching is not affected by this particular bug but see CVE-2019-10191.
Published: 2019-07-16
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DLA Debian DLA DLA-3795-1 knot-resolver security update
EUVD EUVD EUVD-2019-2213 A vulnerability was discovered in DNS resolver component of knot resolver through version 3.2.0 before 4.1.0 which allows remote attackers to bypass DNSSEC validation for non-existence answer. NXDOMAIN answer would get passed through to the client even if its DNSSEC validation failed, instead of sending a SERVFAIL packet. Caching is not affected by this particular bug but see CVE-2019-10191.
Ubuntu USN Ubuntu USN USN-7047-1 Knot Resolver vulnerabilities
History

No history.

Subscriptions

Fedoraproject Fedora
Nic Knot Resolver
cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2025-02-13T16:27:20.781Z

Reserved: 2019-03-27T00:00:00.000Z

Link: CVE-2019-10190

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2019-07-16T18:15:12.087

Modified: 2024-11-21T04:18:37.100

Link: CVE-2019-10190

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses