Lucene search

K
ubuntucveUbuntu.comUB:CVE-2018-21029
HistoryOct 30, 2019 - 12:00 a.m.

CVE-2018-21029

2019-10-3000:00:00
ubuntu.com
ubuntu.com
10

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

0.008 Low

EPSS

Percentile

81.9%

DISPUTED systemd 239 through 245 accepts any certificate signed by a
trusted certificate authority for DNS Over TLS. Server Name Indication
(SNI) is not sent, and there is no hostname validation with the GnuTLS
backend. NOTE: This has been disputed by the developer as not a
vulnerability since hostname validation does not have anything to do with
this issue (i.e. there is no hostname to be sent).

Bugs

Notes

Author Note
mdeslaur DNS over TLS not enabled by default in Ubuntu. this is only an issue in v243 because strict mode got introduced (DNSOverTLS=yes). Versions earlier than 243 only implemented opportunistic mode which, according to specs, might or not validate the resolver and can also be downgraded.

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

0.008 Low

EPSS

Percentile

81.9%