7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
6.8 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
0.166 Low
EPSS
Percentile
95.9%
Software: unbound 1.6.6
OS: Cobalt 7.9
CVE-ID: CVE-2017-15105
CVE-Crit: MEDIUM
CVE-DESC: An error was found in the method of unbound to 1.6.8 verified NSEC records synthesized using wildcards. An improperly checked wildcard NSEC record may be used to prove the absence (NXDOMAIN response) of an existing wildcard record or to accept a NODATA proof using an unbound trick.
CVE-STATUS: default
CVE-REV: default
CVE-ID: CVE-2019-16866.
CVE-Crit: HIGH
CVE-DESC: Unbound before 1.9.4 accesses uninitialized memory, which allows remote attackers to cause a failure with a crafted NOTIFY request. The source IP address of the request must match the access control rule.
CVE-STATUS: default
CVE-REV: Default
CVE-ID: CVE-2019-18934
CVE-Crit: HIGH
CVE-DESC: Unbound versions 1.6.4 through 1.9.4 contain a vulnerability in the ipsec module that can cause shell code to execute after receiving a specially crafted response. This issue can only be caused if unbound was compiled with --enable-ipsecmod
support and ipsecmod is enabled and used in the configuration.
CVE-STATUS: default
CVE-REV: default
CVE-ID: CVE-2020-28935
CVE-Crit: MEDIUM
CVE-DESC: NLnet Labs Unbound, up to and including version 1.12.0, and NLnet Labs NSD, up to and including version 4.3.3, contain a local vulnerability that makes a local symbolic link attack possible. When writing a file, PID Unbound and NSD create a file if one does not exist, or open an existing file for writing. In case the file is already present, they will follow symbolic links if the file appears to be a symbolic link rather than a regular file. Once the file has been written, additional processing of the file will take place, assuming the Unbound / NSD user will start as the new owner of the file. If an attacker has local access to the user that Unbound / NSD is running as, they can create a symbolic link in place of the file PID pointing to the file they would like to delete. If Unbound / NSD is then destroyed and the PID file is not cleared, upon restarting with root privileges Unbound / NSD will overwrite any file pointed to by the symbolic link. This is a local vulnerability that can create a denial of service on the system on which Unbound / NSD is running. It requires an attacker to have access to a user with limited privileges that runs Unbound / NSD and points via symbolic link to a critical file on the system.
CVE-STATUS: default
CVE-REV: default
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
6.8 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
0.166 Low
EPSS
Percentile
95.9%