ID CVE-2011-4528
Summary Unbound before 1.4.13p2 attempts to free unallocated memory during processing of duplicate CNAME records in a signed zone, which allows remote DNS servers to cause a denial of service (daemon crash) via a crafted response. Per: http://unbound.nlnetlabs.nl/downloads/CVE-2011-4528.txt "1.4.14 is released with the patch, but 1.4.14rc1 is vulnerable. http://www.unbound.net/downloads/unbound-1.4.14.tar.gz"
References
Vulnerable Configurations
  • cpe:2.3:a:unbound:unbound:0.0:*:*:*:*:*:*:*
    cpe:2.3:a:unbound:unbound:0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:unbound:unbound:0.1:*:*:*:*:*:*:*
    cpe:2.3:a:unbound:unbound:0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:unbound:unbound:0.2:*:*:*:*:*:*:*
    cpe:2.3:a:unbound:unbound:0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:unbound:unbound:0.3:*:*:*:*:*:*:*
    cpe:2.3:a:unbound:unbound:0.3:*:*:*:*:*:*:*
  • cpe:2.3:a:unbound:unbound:0.4:*:*:*:*:*:*:*
    cpe:2.3:a:unbound:unbound:0.4:*:*:*:*:*:*:*
  • cpe:2.3:a:unbound:unbound:0.5:*:*:*:*:*:*:*
    cpe:2.3:a:unbound:unbound:0.5:*:*:*:*:*:*:*
  • cpe:2.3:a:unbound:unbound:0.6:*:*:*:*:*:*:*
    cpe:2.3:a:unbound:unbound:0.6:*:*:*:*:*:*:*
  • cpe:2.3:a:unbound:unbound:0.7:*:*:*:*:*:*:*
    cpe:2.3:a:unbound:unbound:0.7:*:*:*:*:*:*:*
  • cpe:2.3:a:unbound:unbound:0.7.1:*:*:*:*:*:*:*
    cpe:2.3:a:unbound:unbound:0.7.1:*:*:*:*:*:*:*
  • cpe:2.3:a:unbound:unbound:0.7.2:*:*:*:*:*:*:*
    cpe:2.3:a:unbound:unbound:0.7.2:*:*:*:*:*:*:*
  • cpe:2.3:a:unbound:unbound:0.8:*:*:*:*:*:*:*
    cpe:2.3:a:unbound:unbound:0.8:*:*:*:*:*:*:*
  • cpe:2.3:a:unbound:unbound:0.09:*:*:*:*:*:*:*
    cpe:2.3:a:unbound:unbound:0.09:*:*:*:*:*:*:*
  • cpe:2.3:a:unbound:unbound:0.10:*:*:*:*:*:*:*
    cpe:2.3:a:unbound:unbound:0.10:*:*:*:*:*:*:*
  • cpe:2.3:a:unbound:unbound:0.11:*:*:*:*:*:*:*
    cpe:2.3:a:unbound:unbound:0.11:*:*:*:*:*:*:*
  • cpe:2.3:a:unbound:unbound:1.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:unbound:unbound:1.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:unbound:unbound:1.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:unbound:unbound:1.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:unbound:unbound:1.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:unbound:unbound:1.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:unbound:unbound:1.1.0:*:*:*:*:*:*:*
    cpe:2.3:a:unbound:unbound:1.1.0:*:*:*:*:*:*:*
  • cpe:2.3:a:unbound:unbound:1.1.1:*:*:*:*:*:*:*
    cpe:2.3:a:unbound:unbound:1.1.1:*:*:*:*:*:*:*
  • cpe:2.3:a:unbound:unbound:1.2.0:*:*:*:*:*:*:*
    cpe:2.3:a:unbound:unbound:1.2.0:*:*:*:*:*:*:*
  • cpe:2.3:a:unbound:unbound:1.2.1:*:*:*:*:*:*:*
    cpe:2.3:a:unbound:unbound:1.2.1:*:*:*:*:*:*:*
  • cpe:2.3:a:unbound:unbound:1.3.0:*:*:*:*:*:*:*
    cpe:2.3:a:unbound:unbound:1.3.0:*:*:*:*:*:*:*
  • cpe:2.3:a:unbound:unbound:1.3.1:*:*:*:*:*:*:*
    cpe:2.3:a:unbound:unbound:1.3.1:*:*:*:*:*:*:*
  • cpe:2.3:a:unbound:unbound:1.3.2:*:*:*:*:*:*:*
    cpe:2.3:a:unbound:unbound:1.3.2:*:*:*:*:*:*:*
  • cpe:2.3:a:unbound:unbound:1.3.3:*:*:*:*:*:*:*
    cpe:2.3:a:unbound:unbound:1.3.3:*:*:*:*:*:*:*
  • cpe:2.3:a:unbound:unbound:1.3.4:*:*:*:*:*:*:*
    cpe:2.3:a:unbound:unbound:1.3.4:*:*:*:*:*:*:*
  • cpe:2.3:a:unbound:unbound:1.4.0:*:*:*:*:*:*:*
    cpe:2.3:a:unbound:unbound:1.4.0:*:*:*:*:*:*:*
  • cpe:2.3:a:unbound:unbound:1.4.1:*:*:*:*:*:*:*
    cpe:2.3:a:unbound:unbound:1.4.1:*:*:*:*:*:*:*
  • cpe:2.3:a:unbound:unbound:1.4.2:*:*:*:*:*:*:*
    cpe:2.3:a:unbound:unbound:1.4.2:*:*:*:*:*:*:*
  • cpe:2.3:a:unbound:unbound:1.4.3:*:*:*:*:*:*:*
    cpe:2.3:a:unbound:unbound:1.4.3:*:*:*:*:*:*:*
  • cpe:2.3:a:unbound:unbound:1.4.4:*:*:*:*:*:*:*
    cpe:2.3:a:unbound:unbound:1.4.4:*:*:*:*:*:*:*
  • cpe:2.3:a:unbound:unbound:1.4.5:*:*:*:*:*:*:*
    cpe:2.3:a:unbound:unbound:1.4.5:*:*:*:*:*:*:*
  • cpe:2.3:a:unbound:unbound:1.4.6:*:*:*:*:*:*:*
    cpe:2.3:a:unbound:unbound:1.4.6:*:*:*:*:*:*:*
  • cpe:2.3:a:unbound:unbound:1.4.7:*:*:*:*:*:*:*
    cpe:2.3:a:unbound:unbound:1.4.7:*:*:*:*:*:*:*
  • cpe:2.3:a:unbound:unbound:1.4.8:*:*:*:*:*:*:*
    cpe:2.3:a:unbound:unbound:1.4.8:*:*:*:*:*:*:*
  • cpe:2.3:a:unbound:unbound:1.4.9:*:*:*:*:*:*:*
    cpe:2.3:a:unbound:unbound:1.4.9:*:*:*:*:*:*:*
  • cpe:2.3:a:unbound:unbound:1.4.10:*:*:*:*:*:*:*
    cpe:2.3:a:unbound:unbound:1.4.10:*:*:*:*:*:*:*
  • cpe:2.3:a:unbound:unbound:1.4.11:*:*:*:*:*:*:*
    cpe:2.3:a:unbound:unbound:1.4.11:*:*:*:*:*:*:*
  • cpe:2.3:a:unbound:unbound:1.4.12:*:*:*:*:*:*:*
    cpe:2.3:a:unbound:unbound:1.4.12:*:*:*:*:*:*:*
  • cpe:2.3:a:unbound:unbound:*:*:*:*:*:*:*:*
    cpe:2.3:a:unbound:unbound:*:*:*:*:*:*:*:*
  • cpe:2.3:a:unbound:unbound:1.4.14:rc1:*:*:*:*:*:*
    cpe:2.3:a:unbound:unbound:1.4.14:rc1:*:*:*:*:*:*
CVSS
Base: 5.0 (as of 06-11-2012 - 05:03)
Impact:
Exploitability:
CWE CWE-399
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
NONE NONE PARTIAL
cvss-vector via4 AV:N/AC:L/Au:N/C:N/I:N/A:P
refmap via4
cert-vn VU#209659
confirm http://unbound.nlnetlabs.nl/downloads/CVE-2011-4528.txt
debian DSA-2370
fedora
  • FEDORA-2011-17282
  • FEDORA-2011-17337
osvdb 77909
secunia 47326
Last major update 06-11-2012 - 05:03
Published 20-12-2011 - 11:55
Last modified 06-11-2012 - 05:03
Back to Top