2019-03-27 12:00:51 +00:00
{
"data_type" : "CVE" ,
"data_format" : "MITRE" ,
"data_version" : "4.0" ,
"CVE_data_meta" : {
"ID" : "CVE-2019-10190" ,
2019-07-16 18:00:56 +00:00
"ASSIGNER" : "secalert@redhat.com" ,
"STATE" : "PUBLIC"
2019-07-15 10:30:42 +02:00
} ,
"affects" : {
"vendor" : {
"vendor_data" : [
{
"vendor_name" : "CZ.NIC" ,
"product" : {
"product_data" : [
{
"product_name" : "knot-resolver" ,
"version" : {
"version_data" : [
{
2019-07-16 10:39:10 +02:00
"version_value" : "from 3.2.0 before 4.1.0"
2019-07-15 10:30:42 +02:00
}
]
}
}
]
}
}
]
}
} ,
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng" ,
"value" : "CWE-20"
}
]
}
]
} ,
"references" : {
"reference_data" : [
{
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10190" ,
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10190" ,
"refsource" : "CONFIRM"
2019-07-16 18:00:56 +00:00
} ,
{
"url" : "https://www.knot-resolver.cz/2019-07-10-knot-resolver-4.1.0.html" ,
"refsource" : "CONFIRM" ,
"name" : "https://www.knot-resolver.cz/2019-07-10-knot-resolver-4.1.0.html"
2019-07-19 03:00:47 +00:00
} ,
{
"refsource" : "FEDORA" ,
"name" : "FEDORA-2019-fdb50c675d" ,
"url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VZV5YZZ5766UIG2TFLFJL6EESQNAP5X5/"
2019-07-19 05:00:46 +00:00
} ,
{
"refsource" : "FEDORA" ,
"name" : "FEDORA-2019-20f95b0b39" ,
"url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TMSSWBHINIX4WE6UDXWM66L7JYEK6XS6/"
2019-07-15 10:30:42 +02:00
}
]
2019-03-27 12:00:51 +00:00
} ,
"description" : {
"description_data" : [
{
"lang" : "eng" ,
2019-07-16 18:00:56 +00:00
"value" : "A vulnerability was discovered in DNS resolver component of knot resolver through version 3.2.0 before 4.1.0 which allows remote attackers to bypass DNSSEC validation for non-existence answer. NXDOMAIN answer would get passed through to the client even if its DNSSEC validation failed, instead of sending a SERVFAIL packet. Caching is not affected by this particular bug but see CVE-2019-10191."
2019-03-27 12:00:51 +00:00
}
]
2019-07-15 10:30:42 +02:00
} ,
"impact" : {
"cvss" : [
[
{
"vectorString" : "5.4/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" ,
"version" : "3.0"
}
]
]
2019-03-27 12:00:51 +00:00
}
2019-07-16 18:00:56 +00:00
}