Lucene search

K
cveIscCVE-2018-5745
HistoryOct 09, 2019 - 4:15 p.m.

CVE-2018-5745

2019-10-0916:15:14
CWE-327
isc
web.nvd.nist.gov
429
bind
dns
dnssec
vulnerability
cve-2018-5745
key rollover

CVSS2

3.5

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:M/Au:S/C:N/I:N/A:P

CVSS3

4.9

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H

AI Score

6

Confidence

High

EPSS

0.001

Percentile

34.8%

“managed-keys” is a feature which allows a BIND resolver to automatically maintain the keys used by trust anchors which operators configure for use in DNSSEC validation. Due to an error in the managed-keys feature it is possible for a BIND server which uses managed-keys to exit due to an assertion failure if, during key rollover, a trust anchor’s keys are replaced with keys which use an unsupported algorithm. Versions affected: BIND 9.9.0 -> 9.10.8-P1, 9.11.0 -> 9.11.5-P1, 9.12.0 -> 9.12.3-P1, and versions 9.9.3-S1 -> 9.11.5-S3 of BIND 9 Supported Preview Edition. Versions 9.13.0 -> 9.13.6 of the 9.13 development branch are also affected. Versions prior to BIND 9.9.0 have not been evaluated for vulnerability to CVE-2018-5745.

Affected configurations

Nvd
Node
iscbindRange9.9.09.10.7
OR
iscbindRange9.11.09.11.4
OR
iscbindRange9.12.09.12.2
OR
iscbindRange9.13.09.13.6
OR
iscbindMatch9.9.3s1supported_preview
OR
iscbindMatch9.10.7-
OR
iscbindMatch9.10.8p1
OR
iscbindMatch9.11.5-
OR
iscbindMatch9.11.5p1
OR
iscbindMatch9.11.5s3supported_preview
OR
iscbindMatch9.12.3-
OR
iscbindMatch9.12.3p1
VendorProductVersionCPE
iscbind9.9.3cpe:/a:isc:bind:9.9.3:s1::
iscbind9.12.3cpe:/a:isc:bind:9.12.3:-::
iscbind9.11.5cpe:/a:isc:bind:9.11.5:s3::
iscbind9.11.5cpe:/a:isc:bind:9.11.5:-::
iscbind9.10.7cpe:/a:isc:bind:9.10.7:-::
iscbind9.10.8cpe:/a:isc:bind:9.10.8:p1::
iscbind9.12.3cpe:/a:isc:bind:9.12.3:p1::
iscbindcpe:/a:isc:bind::::
iscbind9.11.5cpe:/a:isc:bind:9.11.5:p1::

CNA Affected

[
  {
    "product": "BIND 9",
    "vendor": "ISC",
    "versions": [
      {
        "status": "affected",
        "version": "BIND 9.9.0 -> 9.10.8-P1, 9.11.0 -> 9.11.5-P1, 9.12.0 -> 9.12.3-P1, and versions 9.9.3-S1 -> 9.11.5-S3 of BIND 9 Supported Preview Edition. Versions 9.13.0 -> 9.13.6 of the 9.13 development branch are also affected. Versions prior to BIND 9.9.0 have not been evaluated for vulnerability to CVE-2018-5745."
      }
    ]
  }
]

CVSS2

3.5

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:M/Au:S/C:N/I:N/A:P

CVSS3

4.9

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H

AI Score

6

Confidence

High

EPSS

0.001

Percentile

34.8%