Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2019-18934

Опубликовано: 26 нояб. 2019
Источник: redhat
CVSS3: 5.6

Описание

Unbound 1.6.4 through 1.9.4 contain a vulnerability in the ipsec module that can cause shell code execution after receiving a specially crafted answer. This issue can only be triggered if unbound was compiled with --enable-ipsecmod support, and ipsecmod is enabled and used in the configuration.

A shell command injection vulnerability was discovered in the way unbound handles DNS queries for systems with a public key used for IPsec. When ipsecmod is enabled, a malicious DNS server could send a DNS reply which would be used during a following DNS query to execute shell commands with the privileges of the unbound process. The same attack could be performed by an attacker who can modify data transmitted over the network, before it reaches the unbound server, if DNSSEC is not used.

Отчет

The versions of unbound as shipped in Red Hat Enterprise Linux 7 and 8 have ipsecmod disabled by default, even though it could be activated through the unbound-control command, it would only be executable by high-privilege users. Moreover, the username option is enabled, reducing the impact of a successful attack, and DNSSEC is used by default, preventing an attacker from modifying DNS packets on the wire. Finally, the default SELinux policies prevent unbound from running any shell command.

Меры по смягчению последствий

  • Do not enable ipsecmod in the unbound.conf configuration file nor via unbound-control, if DNSSEC based Opportunistic IPsec is not used.
  • Use the username option in unbound.conf to make unbound drop privileges and reduce the impact of a successful attack.
  • Enable SELinux to prevent unbound from executing shell commands, apart from the expected one specified in the ipsecmod-hook option.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6unboundNot affected
Red Hat Enterprise Linux 7unboundWill not fix
Red Hat Enterprise Linux 8unboundFixedRHSA-2020:171628.04.2020

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-78
https://bugzilla.redhat.com/show_bug.cgi?id=1776762unbound: command injection with data coming from a specially crafted IPSECKEY answer

5.6 Medium

CVSS3

Связанные уязвимости

CVSS3: 7.3
ubuntu
около 6 лет назад

Unbound 1.6.4 through 1.9.4 contain a vulnerability in the ipsec module that can cause shell code execution after receiving a specially crafted answer. This issue can only be triggered if unbound was compiled with `--enable-ipsecmod` support, and ipsecmod is enabled and used in the configuration.

CVSS3: 7.3
nvd
около 6 лет назад

Unbound 1.6.4 through 1.9.4 contain a vulnerability in the ipsec module that can cause shell code execution after receiving a specially crafted answer. This issue can only be triggered if unbound was compiled with `--enable-ipsecmod` support, and ipsecmod is enabled and used in the configuration.

CVSS3: 7.3
debian
около 6 лет назад

Unbound 1.6.4 through 1.9.4 contain a vulnerability in the ipsec modul ...

CVSS3: 7.3
github
больше 3 лет назад

Unbound 1.6.4 through 1.9.4 contain a vulnerability in the ipsec module that can cause shell code execution after receiving a specially crafted answer. This issue can only be triggered if unbound was compiled with `--enable-ipsecmod` support, and ipsecmod is enabled and used in the configuration.

oracle-oval
почти 6 лет назад

ELSA-2020-1716: unbound security update (MODERATE)

5.6 Medium

CVSS3