Vulnerability Note VU#531342
Unbound DNS resolver denial of service vulnerability
A specially crafted DNS query may cause Unbound to respond with an empty UDP packet which triggers an assertion failure and stops the daemon.
NLnetLabs advisory states:
"Certain types of DNS queries may cause Unbound to respond with a DNS error message. The code generating this error message contains an error whereby Unbound constructs an empty UDP message. That empty UDP message triggers an assertion failsafe in the part of Unbound that is invoked when the interface-automatic option is set. In the case that the interface-automatic option was not set or assertion failsafe is not configured the empty packets would be sent, which is not harmful. The error can only be triggered when Unbound is configured with assertions (--enable-checking or --enable-debug) and has the option interface-automatic turned on.
A remote, unauthenticated attacker can cause the Unbound daemon to crash creating a denial of service condition.
Apply an Update
This vulnerability has been addressed in Unbound 1.4.10. The following patch may also be applied to resolve the issue:
Vendor Information (Learn More)
|Vendor||Status||Date Notified||Date Updated|
|NLnet Labs||Affected||19 May 2011||25 May 2011|
CVSS Metrics (Learn More)
This vulnerability was found by Christopher Olah and reported by NLnetLabs.
This document was written by Jared Allar.
- CVE IDs: CVE-2011-1922
- Date Public: 25 May 2011
- Date First Published: 25 May 2011
- Date Last Updated: 25 May 2011
- Severity Metric: 0.03
- Document Revision: 14
If you have feedback, comments, or additional information about this vulnerability, please send us email.