Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2018-21029

Опубликовано: 24 июн. 2018
Источник: redhat
CVSS3: 6.3

Описание

systemd 239 through 245 accepts any certificate signed by a trusted certificate authority for DNS Over TLS. Server Name Indication (SNI) is not sent, and there is no hostname validation with the GnuTLS backend. NOTE: This has been disputed by the developer as not a vulnerability since hostname validation does not have anything to do with this issue (i.e. there is no hostname to be sent)

A flaw in systemd-resolved was found to incorrectly verify certificates of a DNS resolver used for DNS Over TLS when the DNSOverTLS option is set to yes. A remote attacker in the network path between the vulnerable system and the DNS resolver may use this flaw to perform a man-in-the-middle attack and eavesdrop or modify DNS queries and responses. The attacker can learn the sites visited by a victim user, or redirect the victim user to malicious sites.

Отчет

Versions of systemd as shipped with Red Hat Enterprise Linux 7 are not affected by this issue as they did not include support for DNSOverTLS option. Versions of systemd as shipped with Red Hat Enterprise Linux 8 are not affected by this issue as they did not support the yes value of the DNSOverTLS option. OpenShift Container Platform 4.1 ships a version of systemd from Red Hat Enterprise Linux 8 and is thus also not affected by this issue.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 7systemdNot affected
Red Hat Enterprise Linux 8systemdNot affected
Red Hat OpenShift Container Platform 4systemdNot affected

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-295
https://bugzilla.redhat.com/show_bug.cgi?id=1771725systemd: incorrect certificate validation results in acceptance of any certificate signed by a trusted certificate authority for DNS over TLS

6.3 Medium

CVSS3

Связанные уязвимости

CVSS3: 9.8
ubuntu
почти 6 лет назад

systemd 239 through 245 accepts any certificate signed by a trusted certificate authority for DNS Over TLS. Server Name Indication (SNI) is not sent, and there is no hostname validation with the GnuTLS backend. NOTE: This has been disputed by the developer as not a vulnerability since hostname validation does not have anything to do with this issue (i.e. there is no hostname to be sent)

CVSS3: 9.8
nvd
почти 6 лет назад

systemd 239 through 245 accepts any certificate signed by a trusted certificate authority for DNS Over TLS. Server Name Indication (SNI) is not sent, and there is no hostname validation with the GnuTLS backend. NOTE: This has been disputed by the developer as not a vulnerability since hostname validation does not have anything to do with this issue (i.e. there is no hostname to be sent)

CVSS3: 9.8
msrc
почти 5 лет назад

Описание отсутствует

CVSS3: 9.8
debian
почти 6 лет назад

systemd 239 through 245 accepts any certificate signed by a trusted ce ...

CVSS3: 9.8
github
больше 3 лет назад

systemd 239 through 243 accepts any certificate signed by a trusted certificate authority for DNS Over TLS. Server Name Indication (SNI) is not sent, and there is no hostname validation with the GnuTLS backend.

6.3 Medium

CVSS3