Описание
A vulnerability was found in systemd-resolved. This issue may allow systemd-resolved to accept records of DNSSEC-signed domains even when they have no signature, allowing man-in-the-middles (or the upstream DNS resolver) to manipulate records.
Отчет
This CVE is classified as moderate because the attack requires an active Man-in-the-Middle (MITM) who can intercept and modify the connection's traffic at the TCP/IP layer. Note that DNSSEC= option is by default set to 'no' and changing the value requires root privileges.
Меры по смягчению последствий
Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
Cryostat 2 | systemd | Not affected | ||
Red Hat Enterprise Linux 8 | systemd | Fixed | RHSA-2024:3203 | 22.05.2024 |
Red Hat Enterprise Linux 9 | systemd | Fixed | RHSA-2024:2463 | 30.04.2024 |
Red Hat Enterprise Linux 9 | systemd | Fixed | RHSA-2024:2463 | 30.04.2024 |
Показывать по
Дополнительная информация
Статус:
5.9 Medium
CVSS3
Связанные уязвимости
A vulnerability was found in systemd-resolved. This issue may allow systemd-resolved to accept records of DNSSEC-signed domains even when they have no signature, allowing man-in-the-middles (or the upstream DNS resolver) to manipulate records.
A vulnerability was found in systemd-resolved. This issue may allow systemd-resolved to accept records of DNSSEC-signed domains even when they have no signature, allowing man-in-the-middles (or the upstream DNS resolver) to manipulate records.
A vulnerability was found in systemd-resolved. This issue may allow sy ...
5.9 Medium
CVSS3