The DNSSEC validation library (libval) library in dnssec-tools before 1.3.1 does not properly check that the signing key is the APEX trust anchor, which might allow attackers to conduct unspecified attacks.
References
Configurations
History
21 Nov 2024, 00:43
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/29095 - Vendor Advisory | |
References | () http://secunia.com/advisories/29127 - Patch, Vendor Advisory | |
References | () http://sourceforge.net/mailarchive/forum.php?thread_name=sdlk5lolzj.fsf%40wes.hardakers.net&forum_name=dnssec-tools-users - | |
References | () http://www.securityfocus.com/bid/27998 - | |
References | () http://www.vupen.com/english/advisories/2008/0673/references - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/40836 - | |
References | () https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00820.html - | |
References | () https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00845.html - |
Information
Published : 2008-03-06 00:44
Updated : 2024-11-21 00:43
NVD link : CVE-2008-1184
Mitre link : CVE-2008-1184
CVE.ORG link : CVE-2008-1184
JSON object : View
Products Affected
dnssec-tools
- dnssec-tools
CWE
CWE-255
Credentials Management Errors