Your submission was sent successfully! Close

You have successfully unsubscribed! Close

CVE-2018-5745

Published: 21 February 2019

"managed-keys" is a feature which allows a BIND resolver to automatically maintain the keys used by trust anchors which operators configure for use in DNSSEC validation. Due to an error in the managed-keys feature it is possible for a BIND server which uses managed-keys to exit due to an assertion failure if, during key rollover, a trust anchor's keys are replaced with keys which use an unsupported algorithm. Versions affected: BIND 9.9.0 -> 9.10.8-P1, 9.11.0 -> 9.11.5-P1, 9.12.0 -> 9.12.3-P1, and versions 9.9.3-S1 -> 9.11.5-S3 of BIND 9 Supported Preview Edition. Versions 9.13.0 -> 9.13.6 of the 9.13 development branch are also affected. Versions prior to BIND 9.9.0 have not been evaluated for vulnerability to CVE-2018-5745.

Priority

Medium

Cvss 3 Severity Score

4.9

Score breakdown

Status

Package Release Status
bind9
Launchpad, Ubuntu, Debian
upstream Needs triage

trusty
Released (1:9.9.5.dfsg-3ubuntu0.19)
xenial
Released (1:9.10.3.dfsg.P4-8ubuntu1.12)
bionic
Released (1:9.11.3+dfsg-1ubuntu1.5)
cosmic
Released (1:9.11.4+dfsg-3ubuntu5.1)

Severity score breakdown

Parameter Value
Base score 4.9
Attack vector Network
Attack complexity Low
Privileges required High
User interaction None
Scope Unchanged
Confidentiality None
Integrity impact None
Availability impact High
Vector CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H