7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
unbound is vulnerable to Denial of Service (DoS). The attack exists because of an Insufficient Control of Network Message Volume, aka an “NXNSAttack” issue. This is triggered by random subdomains in the NSDNAME in NS records.
lists.opensuse.org/opensuse-security-announce/2020-06/msg00067.html
lists.opensuse.org/opensuse-security-announce/2020-06/msg00069.html
www.nxnsattack.com
www.openwall.com/lists/oss-security/2020/05/19/5
access.redhat.com/errata/RHSA-2020:2414
access.redhat.com/security/updates/classification/#important
lists.debian.org/debian-lts-announce/2021/02/msg00017.html
lists.fedoraproject.org/archives/list/[email protected]/message/F5NFROI2OMCZLYRTCNGHGO3TUD32LCIQ/
lists.fedoraproject.org/archives/list/[email protected]/message/YJ42N2HBZ3DXMSEC56SWIIOFQGOS5M7I/
nlnetlabs.nl/downloads/unbound/CVE-2020-12662_2020-12663.txt
security.FreeBSD.org/advisories/FreeBSD-SA-20:19.unbound.asc
security.netapp.com/advisory/ntap-20200702-0006/
usn.ubuntu.com/4374-1/
www.debian.org/security/2020/dsa-4694
www.synology.com/security/advisory/Synology_SA_20_12
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P