Vulnerabilities > CVE-2010-0969 - Resource Management Errors vulnerability in Nlnetlabs Unbound

047910
CVSS 0.0 - NONE
Attack vector
UNKNOWN
Attack complexity
UNKNOWN
Privileges required
UNKNOWN
Confidentiality impact
UNKNOWN
Integrity impact
UNKNOWN
Availability impact
UNKNOWN

Summary

Unbound before 1.4.3 does not properly align structures on 64-bit platforms, which allows remote attackers to cause a denial of service (daemon crash) via unspecified vectors.

Common Weakness Enumeration (CWE)

Nessus

  • NASL familyDNS
    NASL idUNBOUND_1_4_3.NASL
    descriptionAccording to its self-reported version number, the remote Unbound DNS resolver is affected by a remote denial of service vulnerability when allocating
    last seen2020-06-01
    modified2020-06-02
    plugin id106380
    published2018-01-26
    reporterThis script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/106380
    titleUnbound < 1.4.3 'sock_list' Structure Allocation Remote Denial Of Service Vulnerability (CVE-2010-0969)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(106380);
      script_version("1.4");
      script_cvs_date("Date: 2019/11/08");
    
      script_cve_id("CVE-2010-0969");
      script_bugtraq_id(38701);
    
      script_name(english:"Unbound < 1.4.3 'sock_list' Structure Allocation Remote Denial Of Service Vulnerability (CVE-2010-0969)");
      script_summary(english:"Checks version of Unbound");
    
      script_set_attribute(attribute:"synopsis", value:
    "The remote name server is affected by a remote denial of service
    vulnerability.");
      script_set_attribute(attribute:"description", value:
    "According to its self-reported version number, the remote Unbound DNS
    resolver is affected by a remote denial of service vulnerability when
    allocating 'sock_list' structures.");
      script_set_attribute(attribute:"see_also", value:"https://nlnetlabs.nl/projects/unbound/download/");
      script_set_attribute(attribute:"solution", value:
    "Upgrade to Unbound version 1.4.3 or later.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P");
      script_set_cvss_temporal_vector("CVSS2#E:F/RL:OF/RC:C");
      script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L");
      script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
      script_set_attribute(attribute:"cvss_score_source", value:"CVE-2010-0969");
    
      script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"true");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2010/03/11");
      script_set_attribute(attribute:"patch_publication_date", value:"2010/03/11");
      script_set_attribute(attribute:"plugin_publication_date", value:"2018/01/26");
    
      script_set_attribute(attribute:"potential_vulnerability", value:"true");
      script_set_attribute(attribute:"plugin_type", value:"remote");
      script_set_attribute(attribute:"cpe", value:"cpe:/a:unbound:unbound");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_family(english:"DNS");
    
      script_copyright(english:"This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
    
      script_dependencies("unbound_version.nasl");
      script_require_keys("Settings/ParanoidReport", "unbound/version");
    
      exit(0);
    }
    
    include("audit.inc");
    include("global_settings.inc");
    include("misc_func.inc");
    
    version = get_kb_item_or_exit("unbound/version");
    if (report_paranoia < 2) audit(AUDIT_PARANOID);
    
    fixed_version = "1.4.3";
    port = 53;
    
    tcp = get_kb_item("DNS/tcp/53");
    if (!isnull(tcp)) proto = "tcp";
    else proto = "udp"; # default
    
    # if version < 1.4.3. (including patches and rc)
    if (
      version =~ "^0\." ||
      version =~ "^1\.[0-3]($|[^0-9])" ||
      version =~ "^1\.4(\.[0-2](\.[0-9]+)*)?(([abp]|rc)[0-9]*)?$" ||
      version =~ "^1\.4\.3([ab]|rc)[0-9]*$"
    )
    {
      report =
        '\n  Installed version : ' + version +
        '\n  Fixed version     : ' + fixed_version +
        '\n';
      security_report_v4(severity:SECURITY_WARNING, port:port, proto:proto, extra:report);
    }
    else audit(AUDIT_LISTEN_NOT_VULN, "Unbound", port, version);
    
  • NASL familyGentoo Local Security Checks
    NASL idGENTOO_GLSA-201110-12.NASL
    descriptionThe remote host is affected by the vulnerability described in GLSA-201110-12 (Unbound: Denial of Service) Multiple vulnerabilities have been discovered in unbound. Please review the CVE identifiers referenced below for details. Impact : A remote attacker could cause a Denial of Service. Workaround : There is no known workaround at this time.
    last seen2020-06-01
    modified2020-06-02
    plugin id56524
    published2011-10-17
    reporterThis script is Copyright (C) 2011-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/56524
    titleGLSA-201110-12 : Unbound: Denial of Service