7.5 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
0.008 Low
EPSS
Percentile
81.9%
DISPUTED systemd 239 through 245 accepts any certificate signed by a
trusted certificate authority for DNS Over TLS. Server Name Indication
(SNI) is not sent, and there is no hostname validation with the GnuTLS
backend. NOTE: This has been disputed by the developer as not a
vulnerability since hostname validation does not have anything to do with
this issue (i.e. there is no hostname to be sent).
Author | Note |
---|---|
mdeslaur | DNS over TLS not enabled by default in Ubuntu. this is only an issue in v243 because strict mode got introduced (DNSOverTLS=yes). Versions earlier than 243 only implemented opportunistic mode which, according to specs, might or not validate the resolver and can also be downgraded. |
7.5 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
0.008 Low
EPSS
Percentile
81.9%