systemd 239 through 245 accepts any certificate signed by a trusted certificate authority for DNS Over TLS. Server Name Indication (SNI) is not sent, and there is no hostname validation with the GnuTLS backend. NOTE: This has been disputed by the developer as not a vulnerability since hostname validation does not have anything to do with this issue (i.e. there is no hostname to be sent)
References
Link | Resource |
---|---|
https://blog.cloudflare.com/dns-encryption-explained/ | Third Party Advisory |
https://github.com/systemd/systemd/blob/v239/man/resolved.conf.xml#L199-L207 | Exploit Third Party Advisory |
https://github.com/systemd/systemd/blob/v243/man/resolved.conf.xml#L196-L207 | Exploit Third Party Advisory |
https://github.com/systemd/systemd/blob/v243/src/resolve/resolved-dnstls-gnutls.c#L62-L63 | Patch Third Party Advisory |
https://github.com/systemd/systemd/issues/9397 | Issue Tracking Third Party Advisory |
https://github.com/systemd/systemd/pull/13870 | Patch Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4NLJVOJMB6ANDILRLDZK26YGLYBEPHKY/ | |
https://security.netapp.com/advisory/ntap-20191122-0002/ | Third Party Advisory |
https://tools.ietf.org/html/rfc7858#section-4.1 | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2019-10-30T21:46:51
Updated: 2020-09-02T12:42:32
Reserved: 2019-10-30T00:00:00
Link: CVE-2018-21029
JSON object: View
NVD Information
Status : Modified
Published: 2019-10-30T22:15:10.667
Modified: 2024-05-17T01:27:14.277
Link: CVE-2018-21029
JSON object: View
Redhat Information
No data.
CWE