Executive Summary
Summary | |
---|---|
Title | Unbound DNS resolver denial of service vulnerability |
Informations | |||
---|---|---|---|
Name | VU#531342 | First vendor Publication | 2011-05-25 |
Vendor | VU-CERT | Last vendor Modification | 2011-05-25 |
Severity (Vendor) | N/A | Revision | M |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:M/Au:N/C:N/I:N/A:P) | |||
---|---|---|---|
Cvss Base Score | 4.3 | Attack Range | Network |
Cvss Impact Score | 2.9 | Attack Complexity | Medium |
Cvss Expoit Score | 8.6 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Vulnerability Note VU#531342Unbound DNS resolver denial of service vulnerabilityOverviewA specially crafted DNS query may cause Unbound to respond with an empty UDP packet which triggers an assertion failure and stops the daemon.I. DescriptionNLnetLabs advisory states:"Certain types of DNS queries may cause Unbound to respond with a DNS error message. The code generating this error message contains an error whereby Unbound constructs an empty UDP message. That empty UDP message triggers an assertion failsafe in the part of Unbound that is invoked when the interface-automatic option is set. In the case that the interface-automatic option was not set or assertion failsafe is not configured the empty packets would be sent, which is not harmful. The error can only be triggered when Unbound is configured with assertions (--enable-checking or --enable-debug) and has the option interface-automatic turned on. II. ImpactA remote, unauthenticated attacker can cause the Unbound daemon to crash creating a denial of service condition.III. SolutionApply an UpdateThis vulnerability has been addressed in Unbound 1.4.10. The following patch may also be applied to resolve the issue:
Referenceshttp://unbound.net/downloads/unbound-latest.tar.gz This vulnerability was found by Christopher Olah and reported by NLnetLabs. This document was written by Jared Allar.
|
Original Source
Url : http://www.kb.cert.org/vuls/id/531342 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-399 | Resource Management Errors |
CPE : Common Platform Enumeration
OpenVAS Exploits
Date | Description |
---|---|
2012-02-12 | Name : Gentoo Security Advisory GLSA 201110-12 (unbound) File : nvt/glsa_201110_12.nasl |
2012-01-09 | Name : Fedora Update for unbound FEDORA-2011-17337 File : nvt/gb_fedora_2011_17337_unbound_fc15.nasl |
2011-08-03 | Name : FreeBSD Ports: unbound File : nvt/freebsd_unbound.nasl |
2011-06-10 | Name : Fedora Update for unbound FEDORA-2011-7555 File : nvt/gb_fedora_2011_7555_unbound_fc14.nasl |
2011-06-03 | Name : Unbound DNS Resolver Remote Denial of Service Vulnerability File : nvt/gb_unbound_47986.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
72750 | Unbound daemon/worker.c DNS Request Error Handling Remote DoS |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2011-10-17 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-201110-12.nasl - Type : ACT_GATHER_INFO |
2011-06-10 | Name : The remote name server is affected by a denial of service vulnerability. File : unbound_1_4_10.nasl - Type : ACT_GATHER_INFO |
2011-06-07 | Name : The remote Fedora host is missing a security update. File : fedora_2011-7555.nasl - Type : ACT_GATHER_INFO |
2011-05-31 | Name : The remote Fedora host is missing a security update. File : fedora_2011-7540.nasl - Type : ACT_GATHER_INFO |
2011-05-26 | Name : The remote FreeBSD host is missing a security-related update. File : freebsd_pkg_dc96ac1f86b111e09e8500215af774f0.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-02-17 12:07:56 |
|