Логотип exploitDog
bind:CVE-2020-28935
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2020-28935

Количество 14

Количество 14

ubuntu логотип

CVE-2020-28935

около 5 лет назад

NLnet Labs Unbound, up to and including version 1.12.0, and NLnet Labs NSD, up to and including version 4.3.3, contain a local vulnerability that would allow for a local symlink attack. When writing the PID file, Unbound and NSD create the file if it is not there, or open an existing file for writing. In case the file was already present, they would follow symlinks if the file happened to be a symlink instead of a regular file. An additional chown of the file would then take place after it was written, making the user Unbound/NSD is supposed to run as the new owner of the file. If an attacker has local access to the user Unbound/NSD runs as, she could create a symlink in place of the PID file pointing to a file that she would like to erase. If then Unbound/NSD is killed and the PID file is not cleared, upon restarting with root privileges, Unbound/NSD will rewrite any file pointed at by the symlink. This is a local vulnerability that could create a Denial of Service of the system Un...

CVSS3: 5.5
EPSS: Низкий
redhat логотип

CVE-2020-28935

больше 5 лет назад

NLnet Labs Unbound, up to and including version 1.12.0, and NLnet Labs NSD, up to and including version 4.3.3, contain a local vulnerability that would allow for a local symlink attack. When writing the PID file, Unbound and NSD create the file if it is not there, or open an existing file for writing. In case the file was already present, they would follow symlinks if the file happened to be a symlink instead of a regular file. An additional chown of the file would then take place after it was written, making the user Unbound/NSD is supposed to run as the new owner of the file. If an attacker has local access to the user Unbound/NSD runs as, she could create a symlink in place of the PID file pointing to a file that she would like to erase. If then Unbound/NSD is killed and the PID file is not cleared, upon restarting with root privileges, Unbound/NSD will rewrite any file pointed at by the symlink. This is a local vulnerability that could create a Denial of Service of the system Un...

CVSS3: 4.4
EPSS: Низкий
nvd логотип

CVE-2020-28935

около 5 лет назад

NLnet Labs Unbound, up to and including version 1.12.0, and NLnet Labs NSD, up to and including version 4.3.3, contain a local vulnerability that would allow for a local symlink attack. When writing the PID file, Unbound and NSD create the file if it is not there, or open an existing file for writing. In case the file was already present, they would follow symlinks if the file happened to be a symlink instead of a regular file. An additional chown of the file would then take place after it was written, making the user Unbound/NSD is supposed to run as the new owner of the file. If an attacker has local access to the user Unbound/NSD runs as, she could create a symlink in place of the PID file pointing to a file that she would like to erase. If then Unbound/NSD is killed and the PID file is not cleared, upon restarting with root privileges, Unbound/NSD will rewrite any file pointed at by the symlink. This is a local vulnerability that could create a Denial of Service of the system Unbou

CVSS3: 5.5
EPSS: Низкий
msrc логотип

CVE-2020-28935

около 5 лет назад

Local symlink attack in Unbound and NSD

CVSS3: 5.5
EPSS: Низкий
debian логотип

CVE-2020-28935

около 5 лет назад

NLnet Labs Unbound, up to and including version 1.12.0, and NLnet Labs ...

CVSS3: 5.5
EPSS: Низкий
github логотип

GHSA-q92f-7cwj-w4w5

больше 3 лет назад

NLnet Labs Unbound, up to and including version 1.12.0, and NLnet Labs NSD, up to and including version 4.3.3, contain a local vulnerability that would allow for a local symlink attack. When writing the PID file, Unbound and NSD create the file if it is not there, or open an existing file for writing. In case the file was already present, they would follow symlinks if the file happened to be a symlink instead of a regular file. An additional chown of the file would then take place after it was written, making the user Unbound/NSD is supposed to run as the new owner of the file. If an attacker has local access to the user Unbound/NSD runs as, she could create a symlink in place of the PID file pointing to a file that she would like to erase. If then Unbound/NSD is killed and the PID file is not cleared, upon restarting with root privileges, Unbound/NSD will rewrite any file pointed at by the symlink. This is a local vulnerability that could create a Denial of Service of the system Un...

CVSS3: 5.5
EPSS: Низкий
fstec логотип

BDU:2022-06878

около 5 лет назад

Уязвимость DNS-серверов NSD и Unbound, связанная с неверным определением символических ссылок перед доступом к файлу, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 5.5
EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2020:2222-1

около 5 лет назад

Security update for nsd

EPSS: Низкий
rocky логотип

RLSA-2021:1853

больше 4 лет назад

Moderate: unbound security, bug fix, and enhancement update

EPSS: Низкий
oracle-oval логотип

ELSA-2021-1853

больше 4 лет назад

ELSA-2021-1853: unbound security, bug fix, and enhancement update (MODERATE)

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2022:0176-1

около 4 лет назад

Security update for unbound

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2022:0301-1

около 4 лет назад

Security update for unbound

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2022:0176-2

почти 4 года назад

Security update for unbound

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2022:0176-1

около 4 лет назад

Security update for unbound

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2020-28935

NLnet Labs Unbound, up to and including version 1.12.0, and NLnet Labs NSD, up to and including version 4.3.3, contain a local vulnerability that would allow for a local symlink attack. When writing the PID file, Unbound and NSD create the file if it is not there, or open an existing file for writing. In case the file was already present, they would follow symlinks if the file happened to be a symlink instead of a regular file. An additional chown of the file would then take place after it was written, making the user Unbound/NSD is supposed to run as the new owner of the file. If an attacker has local access to the user Unbound/NSD runs as, she could create a symlink in place of the PID file pointing to a file that she would like to erase. If then Unbound/NSD is killed and the PID file is not cleared, upon restarting with root privileges, Unbound/NSD will rewrite any file pointed at by the symlink. This is a local vulnerability that could create a Denial of Service of the system Un...

CVSS3: 5.5
0%
Низкий
около 5 лет назад
redhat логотип
CVE-2020-28935

NLnet Labs Unbound, up to and including version 1.12.0, and NLnet Labs NSD, up to and including version 4.3.3, contain a local vulnerability that would allow for a local symlink attack. When writing the PID file, Unbound and NSD create the file if it is not there, or open an existing file for writing. In case the file was already present, they would follow symlinks if the file happened to be a symlink instead of a regular file. An additional chown of the file would then take place after it was written, making the user Unbound/NSD is supposed to run as the new owner of the file. If an attacker has local access to the user Unbound/NSD runs as, she could create a symlink in place of the PID file pointing to a file that she would like to erase. If then Unbound/NSD is killed and the PID file is not cleared, upon restarting with root privileges, Unbound/NSD will rewrite any file pointed at by the symlink. This is a local vulnerability that could create a Denial of Service of the system Un...

CVSS3: 4.4
0%
Низкий
больше 5 лет назад
nvd логотип
CVE-2020-28935

NLnet Labs Unbound, up to and including version 1.12.0, and NLnet Labs NSD, up to and including version 4.3.3, contain a local vulnerability that would allow for a local symlink attack. When writing the PID file, Unbound and NSD create the file if it is not there, or open an existing file for writing. In case the file was already present, they would follow symlinks if the file happened to be a symlink instead of a regular file. An additional chown of the file would then take place after it was written, making the user Unbound/NSD is supposed to run as the new owner of the file. If an attacker has local access to the user Unbound/NSD runs as, she could create a symlink in place of the PID file pointing to a file that she would like to erase. If then Unbound/NSD is killed and the PID file is not cleared, upon restarting with root privileges, Unbound/NSD will rewrite any file pointed at by the symlink. This is a local vulnerability that could create a Denial of Service of the system Unbou

CVSS3: 5.5
0%
Низкий
около 5 лет назад
msrc логотип
CVE-2020-28935

Local symlink attack in Unbound and NSD

CVSS3: 5.5
0%
Низкий
около 5 лет назад
debian логотип
CVE-2020-28935

NLnet Labs Unbound, up to and including version 1.12.0, and NLnet Labs ...

CVSS3: 5.5
0%
Низкий
около 5 лет назад
github логотип
GHSA-q92f-7cwj-w4w5

NLnet Labs Unbound, up to and including version 1.12.0, and NLnet Labs NSD, up to and including version 4.3.3, contain a local vulnerability that would allow for a local symlink attack. When writing the PID file, Unbound and NSD create the file if it is not there, or open an existing file for writing. In case the file was already present, they would follow symlinks if the file happened to be a symlink instead of a regular file. An additional chown of the file would then take place after it was written, making the user Unbound/NSD is supposed to run as the new owner of the file. If an attacker has local access to the user Unbound/NSD runs as, she could create a symlink in place of the PID file pointing to a file that she would like to erase. If then Unbound/NSD is killed and the PID file is not cleared, upon restarting with root privileges, Unbound/NSD will rewrite any file pointed at by the symlink. This is a local vulnerability that could create a Denial of Service of the system Un...

CVSS3: 5.5
0%
Низкий
больше 3 лет назад
fstec логотип
BDU:2022-06878

Уязвимость DNS-серверов NSD и Unbound, связанная с неверным определением символических ссылок перед доступом к файлу, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 5.5
0%
Низкий
около 5 лет назад
suse-cvrf логотип
openSUSE-SU-2020:2222-1

Security update for nsd

около 5 лет назад
rocky логотип
RLSA-2021:1853

Moderate: unbound security, bug fix, and enhancement update

больше 4 лет назад
oracle-oval логотип
ELSA-2021-1853

ELSA-2021-1853: unbound security, bug fix, and enhancement update (MODERATE)

больше 4 лет назад
suse-cvrf логотип
openSUSE-SU-2022:0176-1

Security update for unbound

около 4 лет назад
suse-cvrf логотип
SUSE-SU-2022:0301-1

Security update for unbound

около 4 лет назад
suse-cvrf логотип
SUSE-SU-2022:0176-2

Security update for unbound

почти 4 года назад
suse-cvrf логотип
SUSE-SU-2022:0176-1

Security update for unbound

около 4 лет назад

Уязвимостей на страницу