Vulnerabilities > CVE-2010-0969 - Resource Management Errors vulnerability in Nlnetlabs Unbound
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
Unbound before 1.4.3 does not properly align structures on 64-bit platforms, which allows remote attackers to cause a denial of service (daemon crash) via unspecified vectors.
Vulnerable Configurations
Common Weakness Enumeration (CWE)
Nessus
NASL family DNS NASL id UNBOUND_1_4_3.NASL description According to its self-reported version number, the remote Unbound DNS resolver is affected by a remote denial of service vulnerability when allocating last seen 2020-06-01 modified 2020-06-02 plugin id 106380 published 2018-01-26 reporter This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/106380 title Unbound < 1.4.3 'sock_list' Structure Allocation Remote Denial Of Service Vulnerability (CVE-2010-0969) code # # (C) Tenable Network Security, Inc. # include("compat.inc"); if (description) { script_id(106380); script_version("1.4"); script_cvs_date("Date: 2019/11/08"); script_cve_id("CVE-2010-0969"); script_bugtraq_id(38701); script_name(english:"Unbound < 1.4.3 'sock_list' Structure Allocation Remote Denial Of Service Vulnerability (CVE-2010-0969)"); script_summary(english:"Checks version of Unbound"); script_set_attribute(attribute:"synopsis", value: "The remote name server is affected by a remote denial of service vulnerability."); script_set_attribute(attribute:"description", value: "According to its self-reported version number, the remote Unbound DNS resolver is affected by a remote denial of service vulnerability when allocating 'sock_list' structures."); script_set_attribute(attribute:"see_also", value:"https://nlnetlabs.nl/projects/unbound/download/"); script_set_attribute(attribute:"solution", value: "Upgrade to Unbound version 1.4.3 or later."); script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P"); script_set_cvss_temporal_vector("CVSS2#E:F/RL:OF/RC:C"); script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"); script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C"); script_set_attribute(attribute:"cvss_score_source", value:"CVE-2010-0969"); script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available"); script_set_attribute(attribute:"exploit_available", value:"true"); script_set_attribute(attribute:"vuln_publication_date", value:"2010/03/11"); script_set_attribute(attribute:"patch_publication_date", value:"2010/03/11"); script_set_attribute(attribute:"plugin_publication_date", value:"2018/01/26"); script_set_attribute(attribute:"potential_vulnerability", value:"true"); script_set_attribute(attribute:"plugin_type", value:"remote"); script_set_attribute(attribute:"cpe", value:"cpe:/a:unbound:unbound"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_family(english:"DNS"); script_copyright(english:"This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof."); script_dependencies("unbound_version.nasl"); script_require_keys("Settings/ParanoidReport", "unbound/version"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("misc_func.inc"); version = get_kb_item_or_exit("unbound/version"); if (report_paranoia < 2) audit(AUDIT_PARANOID); fixed_version = "1.4.3"; port = 53; tcp = get_kb_item("DNS/tcp/53"); if (!isnull(tcp)) proto = "tcp"; else proto = "udp"; # default # if version < 1.4.3. (including patches and rc) if ( version =~ "^0\." || version =~ "^1\.[0-3]($|[^0-9])" || version =~ "^1\.4(\.[0-2](\.[0-9]+)*)?(([abp]|rc)[0-9]*)?$" || version =~ "^1\.4\.3([ab]|rc)[0-9]*$" ) { report = '\n Installed version : ' + version + '\n Fixed version : ' + fixed_version + '\n'; security_report_v4(severity:SECURITY_WARNING, port:port, proto:proto, extra:report); } else audit(AUDIT_LISTEN_NOT_VULN, "Unbound", port, version);
NASL family Gentoo Local Security Checks NASL id GENTOO_GLSA-201110-12.NASL description The remote host is affected by the vulnerability described in GLSA-201110-12 (Unbound: Denial of Service) Multiple vulnerabilities have been discovered in unbound. Please review the CVE identifiers referenced below for details. Impact : A remote attacker could cause a Denial of Service. Workaround : There is no known workaround at this time. last seen 2020-06-01 modified 2020-06-02 plugin id 56524 published 2011-10-17 reporter This script is Copyright (C) 2011-2018 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/56524 title GLSA-201110-12 : Unbound: Denial of Service
References
- http://www.unbound.net/pipermail/unbound-users/2010-March/001057.html
- http://www.securityfocus.com/bid/38701
- http://osvdb.org/62903
- http://secunia.com/advisories/38888
- http://www.openwall.com/lists/oss-security/2010/03/12/3
- http://marc.info/?l=oss-security&m=126876222231747&w=2
- http://bugs.gentoo.org/show_bug.cgi?id=309117