Lucene search

K
amazonAmazonALAS-2020-1373
HistoryMay 22, 2020 - 8:58 p.m.

Important: unbound

2020-05-2220:58:00
alas.aws.amazon.com
29

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.017 Low

EPSS

Percentile

87.7%

Issue Overview:

A network amplification vulnerability was found in Unbound, in the way it processes delegation messages from one authoritative zone to another. This flaw allows an attacker to cause a denial of service or be part of an attack against another DNS server when Unbound is deployed as a recursive resolver or authoritative name server.(CVE-2020-12662)

Unbound before 1.10.1 has an infinite loop via malformed DNS answers received from upstream servers.(CVE-2020-12663)

Affected Packages:

unbound

Issue Correction:
Run yum update unbound to update your system.

New Packages:

i686:  
    unbound-1.6.6-1.5.amzn1.i686  
    unbound-libs-1.6.6-1.5.amzn1.i686  
    unbound-debuginfo-1.6.6-1.5.amzn1.i686  
    unbound-devel-1.6.6-1.5.amzn1.i686  
    unbound-python-1.6.6-1.5.amzn1.i686  
  
src:  
    unbound-1.6.6-1.5.amzn1.src  
  
x86_64:  
    unbound-devel-1.6.6-1.5.amzn1.x86_64  
    unbound-debuginfo-1.6.6-1.5.amzn1.x86_64  
    unbound-libs-1.6.6-1.5.amzn1.x86_64  
    unbound-python-1.6.6-1.5.amzn1.x86_64  
    unbound-1.6.6-1.5.amzn1.x86_64  

Additional References

Red Hat: CVE-2020-12662, CVE-2020-12663

Mitre: CVE-2020-12662, CVE-2020-12663

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.017 Low

EPSS

Percentile

87.7%