Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2019-25042

Опубликовано: 27 апр. 2021
Источник: debian
EPSS Низкий

Описание

Unbound before 1.9.5 allows an out-of-bounds write via a compressed name in rdata_copy. NOTE: The vendor disputes that this is a vulnerability. Although the code may be vulnerable, a running Unbound installation cannot be remotely or locally exploited

Пакеты

ПакетСтатусВерсия исправленияРелизТип
unboundfixed1.9.6-1package
unboundend-of-lifestretchpackage

Примечания

  • https://github.com/NLnetLabs/unbound/commit/6c3a0b54ed8ace93d5b5ca7b8078dc87e75cd640

  • Not deemed an exploitable vulnerability by upstream

EPSS

Процентиль: 72%
0.00738
Низкий

Связанные уязвимости

CVSS3: 9.8
ubuntu
почти 5 лет назад

Unbound before 1.9.5 allows an out-of-bounds write via a compressed name in rdata_copy. NOTE: The vendor disputes that this is a vulnerability. Although the code may be vulnerable, a running Unbound installation cannot be remotely or locally exploited

CVSS3: 9.8
redhat
около 6 лет назад

Unbound before 1.9.5 allows an out-of-bounds write via a compressed name in rdata_copy. NOTE: The vendor disputes that this is a vulnerability. Although the code may be vulnerable, a running Unbound installation cannot be remotely or locally exploited

CVSS3: 9.8
nvd
почти 5 лет назад

Unbound before 1.9.5 allows an out-of-bounds write via a compressed name in rdata_copy. NOTE: The vendor disputes that this is a vulnerability. Although the code may be vulnerable, a running Unbound installation cannot be remotely or locally exploited

CVSS3: 9.8
github
больше 3 лет назад

Unbound before 1.9.5 allows an out-of-bounds write via a compressed name in rdata_copy.

CVSS3: 9.8
fstec
около 6 лет назад

Уязвимость функции rdata_copy DNS-сервера Unbound, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании

EPSS

Процентиль: 72%
0.00738
Низкий