Unbound < 1.6.3 use-caps-for-id Option qname Handling Denial of Service
2018-01-26T00:00:00
ID UNBOUND_1_6_3.NASL Type nessus Reporter This script is Copyright (C) 2018 Tenable Network Security, Inc. Modified 2021-03-02T00:00:00
Description
According to its self-reported version number, the remote Unbound DNS
resolver is affected by a denial of service vulnerability when
handling qnames in responses with the use-caps-for-id option enabled.
#
# (C) Tenable Network Security, Inc.
#
include("compat.inc");
if (description)
{
script_id(106382);
script_version("1.5");
script_cvs_date("Date: 2018/11/15 20:50:21");
script_name(english:"Unbound < 1.6.3 use-caps-for-id Option qname Handling Denial of Service");
script_summary(english:"Checks version of Unbound");
script_set_attribute(attribute:"synopsis", value:
"The remote name server is affected by a remote denial of service
vulnerability.");
script_set_attribute(attribute:"description", value:
"According to its self-reported version number, the remote Unbound DNS
resolver is affected by a denial of service vulnerability when
handling qnames in responses with the use-caps-for-id option enabled.");
script_set_attribute(attribute:"see_also", value:"https://nlnetlabs.nl/projects/unbound/download/");
script_set_attribute(attribute:"solution", value:"Upgrade to Unbound version 1.6.3 or later.");
script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:P");
script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L");
script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
script_set_attribute(attribute:"vuln_publication_date", value:"2017/06/13");
script_set_attribute(attribute:"patch_publication_date", value:"2017/06/13");
script_set_attribute(attribute:"plugin_publication_date", value:"2018/01/26");
script_set_attribute(attribute:"potential_vulnerability", value:"true");
script_set_attribute(attribute:"cpe", value:"cpe:/a:unbound:unbound");
script_set_attribute(attribute:"plugin_type", value:"remote");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"DNS");
script_copyright(english:"This script is Copyright (C) 2018 Tenable Network Security, Inc.");
script_dependencies("unbound_version.nasl");
script_require_keys("Settings/ParanoidReport","unbound/version");
exit(0);
}
include("audit.inc");
include("global_settings.inc");
include("misc_func.inc");
version = get_kb_item_or_exit("unbound/version");
if (report_paranoia < 2) audit(AUDIT_PARANOID);
fixed_version = "1.6.3";
port = 53;
tcp = get_kb_item("DNS/tcp/53");
if (!isnull(tcp)) proto = "tcp";
else proto = "udp"; # default
# if version < 1.6.3 (including patches and rc)
if (
version =~ "^0\." ||
version =~ "^1\.[0-5]($|[^0-9])" ||
version =~ "^1\.6(\.[0-2](\.[0-9]+)*)?(([abp]|rc)[0-9]*)?$" ||
version =~ "^1\.6\.3([ab]|rc)[0-9]*$"
)
{
report =
'\n Installed version : ' + version +
'\n Fixed version : ' + fixed_version +
'\n';
security_report_v4(severity:SECURITY_WARNING, port:port, proto:proto, extra:report);
}
else audit(AUDIT_LISTEN_NOT_VULN, "Unbound", port, version);
{"id": "UNBOUND_1_6_3.NASL", "bulletinFamily": "scanner", "title": "Unbound < 1.6.3 use-caps-for-id Option qname Handling Denial of Service", "description": "According to its self-reported version number, the remote Unbound DNS\nresolver is affected by a denial of service vulnerability when\nhandling qnames in responses with the use-caps-for-id option enabled.", "published": "2018-01-26T00:00:00", "modified": "2021-03-02T00:00:00", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P"}, "href": "https://www.tenable.com/plugins/nessus/106382", "reporter": "This script is Copyright (C) 2018 Tenable Network Security, Inc.", "references": ["https://nlnetlabs.nl/projects/unbound/download/"], "cvelist": [], "type": "nessus", "lastseen": "2021-03-01T07:46:12", "edition": 25, "viewCount": 37, "enchantments": {"dependencies": {"references": [], "modified": "2021-03-01T07:46:12", "rev": 2}, "score": {"value": -0.2, "vector": "NONE", "modified": "2021-03-01T07:46:12", "rev": 2}, "vulnersScore": -0.2}, "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(106382);\n script_version(\"1.5\");\n script_cvs_date(\"Date: 2018/11/15 20:50:21\");\n\n\n script_name(english:\"Unbound < 1.6.3 use-caps-for-id Option qname Handling Denial of Service\");\n script_summary(english:\"Checks version of Unbound\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote name server is affected by a remote denial of service\nvulnerability.\");\n script_set_attribute(attribute:\"description\", value:\n\"According to its self-reported version number, the remote Unbound DNS\nresolver is affected by a denial of service vulnerability when\nhandling qnames in responses with the use-caps-for-id option enabled.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://nlnetlabs.nl/projects/unbound/download/\");\n\n script_set_attribute(attribute:\"solution\", value:\"Upgrade to Unbound version 1.6.3 or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2017/06/13\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2017/06/13\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2018/01/26\");\n\n script_set_attribute(attribute:\"potential_vulnerability\", value:\"true\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:unbound:unbound\");\n script_set_attribute(attribute:\"plugin_type\", value:\"remote\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"DNS\");\n\n script_copyright(english:\"This script is Copyright (C) 2018 Tenable Network Security, Inc.\");\n\n script_dependencies(\"unbound_version.nasl\");\n script_require_keys(\"Settings/ParanoidReport\",\"unbound/version\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\n\nversion = get_kb_item_or_exit(\"unbound/version\");\nif (report_paranoia < 2) audit(AUDIT_PARANOID);\n\nfixed_version = \"1.6.3\";\nport = 53;\n\ntcp = get_kb_item(\"DNS/tcp/53\");\nif (!isnull(tcp)) proto = \"tcp\";\nelse proto = \"udp\"; # default\n\n# if version < 1.6.3 (including patches and rc)\nif (\n version =~ \"^0\\.\" ||\n version =~ \"^1\\.[0-5]($|[^0-9])\" ||\n version =~ \"^1\\.6(\\.[0-2](\\.[0-9]+)*)?(([abp]|rc)[0-9]*)?$\" ||\n version =~ \"^1\\.6\\.3([ab]|rc)[0-9]*$\"\n)\n{\n report =\n '\\n Installed version : ' + version +\n '\\n Fixed version : ' + fixed_version +\n '\\n';\n security_report_v4(severity:SECURITY_WARNING, port:port, proto:proto, extra:report);\n}\nelse audit(AUDIT_LISTEN_NOT_VULN, \"Unbound\", port, version);\n", "naslFamily": "DNS", "pluginID": "106382", "cpe": ["cpe:/a:unbound:unbound"], "scheme": null, "cvss3": {"score": 5.3, "vector": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}}