CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
EPSS
Percentile
73.5%
A vulnerability named βNon-Responsive Delegation Attackβ (NRDelegation
Attack) has been discovered in various DNS resolving software. The
NRDelegation Attack works by having a malicious delegation with a
considerable number of non responsive nameservers. The attack starts by
querying a resolver for a record that relies on those unresponsive
nameservers. The attack can cause a resolver to spend a lot of
time/resources resolving records under a malicious delegation point where a
considerable number of unresponsive NS records reside. It can trigger high
CPU usage in some resolver implementations that continually look in the
cache for resolved NS records in that delegation. This can lead to degraded
performance and eventually denial of service in orchestrated attacks.
Unbound does not suffer from high CPU usage, but resources are still needed
for resolving the malicious delegation. Unbound will keep trying to resolve
the record until hard limits are reached. Based on the nature of the attack
and the replies, different limits could be reached. From version 1.16.3 on,
Unbound introduces fixes for better performance when under load, by cutting
opportunistic queries for nameserver discovery and DNSKEY prefetching and
limiting the number of times a delegation point can issue a cache lookup
for missing records.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 18.04 | noarch | unbound | <Β 1.6.7-1ubuntu2.6 | UNKNOWN |
ubuntu | 20.04 | noarch | unbound | <Β 1.9.4-2ubuntu1.4 | UNKNOWN |
ubuntu | 22.04 | noarch | unbound | <Β 1.13.1-1ubuntu5.3 | UNKNOWN |
ubuntu | 22.10 | noarch | unbound | <Β 1.16.2-1ubuntu0.1 | UNKNOWN |
ubuntu | 14.04 | noarch | unbound | <Β any | UNKNOWN |
ubuntu | 16.04 | noarch | unbound | <Β any | UNKNOWN |