{"id":"CVE-2018-5745","details":"\"managed-keys\" is a feature which allows a BIND resolver to automatically maintain the keys used by trust anchors which operators configure for use in DNSSEC validation. Due to an error in the managed-keys feature it is possible for a BIND server which uses managed-keys to exit due to an assertion failure if, during key rollover, a trust anchor's keys are replaced with keys which use an unsupported algorithm. Versions affected: BIND 9.9.0 -\u003e 9.10.8-P1, 9.11.0 -\u003e 9.11.5-P1, 9.12.0 -\u003e 9.12.3-P1, and versions 9.9.3-S1 -\u003e 9.11.5-S3 of BIND 9 Supported Preview Edition. Versions 9.13.0 -\u003e 9.13.6 of the 9.13 development branch are also affected. Versions prior to BIND 9.9.0 have not been evaluated for vulnerability to CVE-2018-5745.","modified":"2026-04-11T12:09:28.630936Z","published":"2019-10-09T16:15:14Z","related":["CGA-3x7m-f7pw-r2vw","SUSE-SU-2019:1407-1","SUSE-SU-2019:14074-1","SUSE-SU-2019:1449-1","SUSE-SU-2019:2502-1","openSUSE-SU-2019:1533-1","openSUSE-SU-2024:10650-1"],"database_specific":{"unresolved_ranges":[{"source":"CPE_FIELD","cpe":"cpe:2.3:a:isc:bind:9.10.8:p1:*:*:*:*:*:*","extracted_events":[{"last_affected":"9.10.8-p1"}]},{"source":"CPE_FIELD","cpe":"cpe:2.3:a:isc:bind:9.11.5:s3:*:*:*:supported_preview:*:*","extracted_events":[{"last_affected":"9.11.5-s3"}]}]},"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2019:3552"},{"type":"ADVISORY","url":"https://kb.isc.org/docs/cve-2018-5745"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://gitlab.isc.org/isc-projects/bind9","events":[{"introduced":"3514c49b2fbcdf95b2735878e2487fce9a3ddad5"},{"last_affected":"db65d701b999d10e555c13454bceb74df4494975"},{"introduced":"1477c19dd9a347ee19a42dac227f299a4680506f"},{"last_affected":"2fe4344de48d6061bef5a4000066a99a7c1296a6"},{"introduced":"71a40862c0be867999867cd99e21c2266a5e452b"},{"last_affected":"3631aeb0709b460afc66ca8bff609bf93ef24bec"},{"introduced":"29b3a7d84240a51099490c0f39ae537f4e0d6a7a"},{"last_affected":"acfbf1ae9438873ef2fccacd5b3692f1aab99939"},{"introduced":"0"},{"last_affected":"1c59cea1c0e26e2da3f2afb90200bfe9f7748c03"},{"last_affected":"db65d701b999d10e555c13454bceb74df4494975"},{"last_affected":"3b0b2047cea8d9e61d0c1eabe2d3c958997e8be4"},{"last_affected":"647dac6f96293b98d9d865d367feb74710cd9b46"},{"last_affected":"6c8e92c06d2d5b5904c925ca48564a93f1edba44"},{"last_affected":"cfdd35f26ac4509cec614284ce036e487a552504"}],"database_specific":{"source":"CPE_FIELD","cpe":["cpe:2.3:a:isc:bind:*:*:*:*:*:*:*:*","cpe:2.3:a:isc:bind:9.9.3:s1:*:*:*:supported_preview:*:*","cpe:2.3:a:isc:bind:9.10.7:-:*:*:*:*:*:*","cpe:2.3:a:isc:bind:9.11.5:-:*:*:*:*:*:*","cpe:2.3:a:isc:bind:9.11.5:p1:*:*:*:*:*:*","cpe:2.3:a:isc:bind:9.12.3:-:*:*:*:*:*:*","cpe:2.3:a:isc:bind:9.12.3:p1:*:*:*:*:*:*"],"extracted_events":[{"introduced":"9.9.0"},{"last_affected":"9.10.7"},{"introduced":"9.11.0"},{"last_affected":"9.11.4"},{"introduced":"9.12.0"},{"last_affected":"9.12.2"},{"introduced":"9.13.0"},{"last_affected":"9.13.6"},{"introduced":"0"},{"last_affected":"9.9.3-s1"},{"last_affected":"9.10.7-NA"},{"last_affected":"9.11.5-NA"},{"last_affected":"9.11.5-p1"},{"last_affected":"9.12.3-NA"},{"last_affected":"9.12.3-p1"}]}}],"versions":["v9.10.0a1","v9.10.0a2","v9.10.0b1","v9.10.0b2","v9.10.0rc1","v9.10.0rc2","v9.10.1","v9.10.1b1","v9.10.1b2","v9.10.1rc1","v9.10.1rc2","v9.10.2","v9.10.2b1","v9.10.2rc1","v9.10.2rc2","v9.10.3","v9.10.3b1","v9.10.3rc1","v9.10.4","v9.10.4b1","v9.10.4b2","v9.10.4b3","v9.10.4rc1","v9.10.5","v9.10.5b1","v9.10.5rc1","v9.10.5rc2","v9.10.5rc3","v9.10.6b1","v9.10.6rc1","v9.10.7","v9.10.7b1","v9.10.7rc1","v9.11.0","v9.11.0a1","v9.11.0a2","v9.11.0a3","v9.11.1","v9.11.1b1","v9.11.1rc1","v9.11.1rc2","v9.11.1rc3","v9.11.2b1","v9.11.2rc1","v9.11.3b1","v9.11.3rc1","v9.11.4","v9.11.4rc2","v9.11.5","v9.11.5-P1","v9.11.5rc1","v9.12.0a1","v9.12.0b1","v9.12.0b2","v9.12.0rc1","v9.12.1b1","v9.12.1rc1","v9.12.2","v9.12.2rc2","v9.12.3","v9.12.3-P1","v9.12.3rc1","v9.13.0","v9.13.2","v9.13.3","v9.13.4","v9.13.5","v9.13.6","v9.5.0a1","v9.5.0a2","v9.5.0a3","v9.5.0a4","v9.5.0a5","v9.5.0a6","v9.7.0a1","v9.9.0","v9.9.1","v9.9.2b1","v9.9.2rc1","v9.9.3b1"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2018-5745.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}]}