Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2019-16866

Опубликовано: 03 окт. 2019
Источник: debian
EPSS Низкий

Описание

Unbound before 1.9.4 accesses uninitialized memory, which allows remote attackers to trigger a crash via a crafted NOTIFY query. The source IP address of the query must match an access-control rule.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
unboundfixed1.9.4-1package
unboundnot-affectedstretchpackage
unboundnot-affectedjessiepackage

Примечания

  • https://nlnetlabs.nl/downloads/unbound/CVE-2019-16866.txt

  • Patch: https://nlnetlabs.nl/downloads/unbound/patch_cve_2019-16866.diff

  • https://github.com/NLnetLabs/unbound/commit/b60c4a472c856f0a98120b7259e991b3a6507eb5

  • https://ostif.org/our-audit-of-unbound-dns-by-x41-d-sec-full-results/

EPSS

Процентиль: 83%
0.01836
Низкий

Связанные уязвимости

CVSS3: 7.5
ubuntu
больше 6 лет назад

Unbound before 1.9.4 accesses uninitialized memory, which allows remote attackers to trigger a crash via a crafted NOTIFY query. The source IP address of the query must match an access-control rule.

CVSS3: 5.3
redhat
больше 6 лет назад

Unbound before 1.9.4 accesses uninitialized memory, which allows remote attackers to trigger a crash via a crafted NOTIFY query. The source IP address of the query must match an access-control rule.

CVSS3: 7.5
nvd
больше 6 лет назад

Unbound before 1.9.4 accesses uninitialized memory, which allows remote attackers to trigger a crash via a crafted NOTIFY query. The source IP address of the query must match an access-control rule.

CVSS3: 7.5
github
больше 3 лет назад

Unbound before 1.9.4 accesses uninitialized memory, which allows remote attackers to trigger a crash via a crafted NOTIFY query. The source IP address of the query must match an access-control rule.

CVSS3: 7.5
fstec
больше 6 лет назад

Уязвимость DNS-сервера Unbound, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю вызвать отказ в обслуживании

EPSS

Процентиль: 83%
0.01836
Низкий