Executive Summary
Summary | |
---|---|
Title | unbound security update |
Informations | |||
---|---|---|---|
Name | DSA-2243 | First vendor Publication | 2011-05-27 |
Vendor | Debian | Last vendor Modification | 2011-05-27 |
Severity (Vendor) | N/A | Revision | 1 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:N/I:N/A:P) | |||
---|---|---|---|
Cvss Base Score | 5 | Attack Range | Network |
Cvss Impact Score | 2.9 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
It was discovered that Unbound, a caching DNS resolver, ceases to provide answers for zones signed using DNSSEC after it has processed a crafted query. (CVE-2009-4008) In addition, this update improves the level of DNSSEC support in the lenny version of Unbound so that it is possible for system administrators to configure the trust anchor for the root zone. For the oldstable distribution (lenny), this problem has been fixed in version 1.4.6-1~lenny1. For the other distributions (squeeze, wheezy, sid), this problem has been fixed in version 1.4.4-1. We recommend that you upgrade your unbound packages. |
Original Source
Url : http://www.debian.org/security/2011/dsa-2243 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-399 | Resource Management Errors |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:12726 | |||
Oval ID: | oval:org.mitre.oval:def:12726 | ||
Title: | DSA-2243-1 unbound -- design flaw | ||
Description: | It was discovered that Unbound, a caching DNS resolver, ceases to provide answers for zones signed using DNSSEC after it has processed a crafted query. In addition, this update improves the level of DNSSEC support in the lenny version of Unbound so that it is possible for system administrators to configure the trust anchor for the root zone. | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-2243-1 CVE-2009-4008 | Version: | 5 |
Platform(s): | Debian GNU/Linux 5.0 | Product(s): | unbound |
Definition Synopsis: | |||
CPE : Common Platform Enumeration
OpenVAS Exploits
Date | Description |
---|---|
2011-08-03 | Name : Debian Security Advisory DSA 2243-1 (unbound) File : nvt/deb_2243_1.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
73253 | Unbound Signed Zone Query Response DNSSEC Outage Remote DoS |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2011-06-10 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-2243.nasl - Type : ACT_GATHER_INFO |
2011-06-10 | Name : The remote name server is affected by a denial of service vulnerability. File : unbound_1_4_4.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-02-17 11:30:11 |
|