CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
EPSS
Percentile
45.3%
NLnet Labs Unbound, up to and including version 1.16.1, is vulnerable to a
novel type of the “ghost domain names” attack. The vulnerability works by
targeting an Unbound instance. Unbound is queried for a rogue domain name
when the cached delegation information is about to expire. The rogue
nameserver delays the response so that the cached delegation information is
expired. Upon receiving the delayed answer containing the delegation
information, Unbound overwrites the now expired entries. This action can be
repeated when the delegation information is about to expire making the
rogue delegation information ever-updating. From version 1.16.2 on, Unbound
stores the start time for a query and uses that to decide if the cached
delegation information can be overwritten.
Author | Note |
---|---|
mdeslaur | same commit as CVE-2022-30698 |
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 18.04 | noarch | unbound | < 1.6.7-1ubuntu2.5 | UNKNOWN |
ubuntu | 20.04 | noarch | unbound | < 1.9.4-2ubuntu1.3 | UNKNOWN |
ubuntu | 22.04 | noarch | unbound | < 1.13.1-1ubuntu5.1 | UNKNOWN |
ubuntu | 22.10 | noarch | unbound | < 1.16.2-1 | UNKNOWN |
ubuntu | 23.04 | noarch | unbound | < 1.16.2-1 | UNKNOWN |
ubuntu | 23.10 | noarch | unbound | < 1.16.2-1 | UNKNOWN |
ubuntu | 24.04 | noarch | unbound | < 1.16.2-1 | UNKNOWN |
ubuntu | 14.04 | noarch | unbound | < any | UNKNOWN |
ubuntu | 16.04 | noarch | unbound | < any | UNKNOWN |