Lucene search

K
rosalinuxROSA LABROSA-SA-2021-1990
HistoryJul 02, 2021 - 6:18 p.m.

Advisory ROSA-SA-2021-1990

2021-07-0218:18:13
ROSA LAB
abf.rosalinux.ru
11

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.166 Low

EPSS

Percentile

95.9%

Software: unbound 1.6.6
OS: Cobalt 7.9

CVE-ID: CVE-2017-15105
CVE-Crit: MEDIUM
CVE-DESC: An error was found in the method of unbound to 1.6.8 verified NSEC records synthesized using wildcards. An improperly checked wildcard NSEC record may be used to prove the absence (NXDOMAIN response) of an existing wildcard record or to accept a NODATA proof using an unbound trick.
CVE-STATUS: default
CVE-REV: default

CVE-ID: CVE-2019-16866.
CVE-Crit: HIGH
CVE-DESC: Unbound before 1.9.4 accesses uninitialized memory, which allows remote attackers to cause a failure with a crafted NOTIFY request. The source IP address of the request must match the access control rule.
CVE-STATUS: default
CVE-REV: Default

CVE-ID: CVE-2019-18934
CVE-Crit: HIGH
CVE-DESC: Unbound versions 1.6.4 through 1.9.4 contain a vulnerability in the ipsec module that can cause shell code to execute after receiving a specially crafted response. This issue can only be caused if unbound was compiled with --enable-ipsecmod support and ipsecmod is enabled and used in the configuration.
CVE-STATUS: default
CVE-REV: default

CVE-ID: CVE-2020-28935
CVE-Crit: MEDIUM
CVE-DESC: NLnet Labs Unbound, up to and including version 1.12.0, and NLnet Labs NSD, up to and including version 4.3.3, contain a local vulnerability that makes a local symbolic link attack possible. When writing a file, PID Unbound and NSD create a file if one does not exist, or open an existing file for writing. In case the file is already present, they will follow symbolic links if the file appears to be a symbolic link rather than a regular file. Once the file has been written, additional processing of the file will take place, assuming the Unbound / NSD user will start as the new owner of the file. If an attacker has local access to the user that Unbound / NSD is running as, they can create a symbolic link in place of the file PID pointing to the file they would like to delete. If Unbound / NSD is then destroyed and the PID file is not cleared, upon restarting with root privileges Unbound / NSD will overwrite any file pointed to by the symbolic link. This is a local vulnerability that can create a denial of service on the system on which Unbound / NSD is running. It requires an attacker to have access to a user with limited privileges that runs Unbound / NSD and points via symbolic link to a critical file on the system.
CVE-STATUS: default
CVE-REV: default

OSVersionArchitecturePackageVersionFilename
Cobaltanynoarchunbound< 1.6.6UNKNOWN

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.166 Low

EPSS

Percentile

95.9%