ID CVE-2011-1922
Summary daemon/worker.c in Unbound 1.x before 1.4.10, when debugging functionality and the interface-automatic option are enabled, allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a crafted DNS request that triggers improper error handling.
References
Vulnerable Configurations
  • cpe:2.3:a:nlnetlabs:unbound:1.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:nlnetlabs:unbound:1.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:nlnetlabs:unbound:1.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:nlnetlabs:unbound:1.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:nlnetlabs:unbound:1.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:nlnetlabs:unbound:1.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:nlnetlabs:unbound:1.1.0:*:*:*:*:*:*:*
    cpe:2.3:a:nlnetlabs:unbound:1.1.0:*:*:*:*:*:*:*
  • cpe:2.3:a:nlnetlabs:unbound:1.1.1:*:*:*:*:*:*:*
    cpe:2.3:a:nlnetlabs:unbound:1.1.1:*:*:*:*:*:*:*
  • cpe:2.3:a:nlnetlabs:unbound:1.2.0:*:*:*:*:*:*:*
    cpe:2.3:a:nlnetlabs:unbound:1.2.0:*:*:*:*:*:*:*
  • cpe:2.3:a:nlnetlabs:unbound:1.2.1:*:*:*:*:*:*:*
    cpe:2.3:a:nlnetlabs:unbound:1.2.1:*:*:*:*:*:*:*
  • cpe:2.3:a:nlnetlabs:unbound:1.3.0:*:*:*:*:*:*:*
    cpe:2.3:a:nlnetlabs:unbound:1.3.0:*:*:*:*:*:*:*
  • cpe:2.3:a:nlnetlabs:unbound:1.3.1:*:*:*:*:*:*:*
    cpe:2.3:a:nlnetlabs:unbound:1.3.1:*:*:*:*:*:*:*
  • cpe:2.3:a:nlnetlabs:unbound:1.3.2:*:*:*:*:*:*:*
    cpe:2.3:a:nlnetlabs:unbound:1.3.2:*:*:*:*:*:*:*
  • cpe:2.3:a:nlnetlabs:unbound:1.3.3:*:*:*:*:*:*:*
    cpe:2.3:a:nlnetlabs:unbound:1.3.3:*:*:*:*:*:*:*
  • cpe:2.3:a:nlnetlabs:unbound:1.3.4:*:*:*:*:*:*:*
    cpe:2.3:a:nlnetlabs:unbound:1.3.4:*:*:*:*:*:*:*
  • cpe:2.3:a:nlnetlabs:unbound:1.4.0:*:*:*:*:*:*:*
    cpe:2.3:a:nlnetlabs:unbound:1.4.0:*:*:*:*:*:*:*
  • cpe:2.3:a:nlnetlabs:unbound:1.4.1:*:*:*:*:*:*:*
    cpe:2.3:a:nlnetlabs:unbound:1.4.1:*:*:*:*:*:*:*
  • cpe:2.3:a:nlnetlabs:unbound:1.4.2:*:*:*:*:*:*:*
    cpe:2.3:a:nlnetlabs:unbound:1.4.2:*:*:*:*:*:*:*
  • cpe:2.3:a:nlnetlabs:unbound:1.4.3:*:*:*:*:*:*:*
    cpe:2.3:a:nlnetlabs:unbound:1.4.3:*:*:*:*:*:*:*
  • cpe:2.3:a:nlnetlabs:unbound:1.4.4:*:*:*:*:*:*:*
    cpe:2.3:a:nlnetlabs:unbound:1.4.4:*:*:*:*:*:*:*
  • cpe:2.3:a:nlnetlabs:unbound:1.4.5:*:*:*:*:*:*:*
    cpe:2.3:a:nlnetlabs:unbound:1.4.5:*:*:*:*:*:*:*
  • cpe:2.3:a:nlnetlabs:unbound:1.4.6:*:*:*:*:*:*:*
    cpe:2.3:a:nlnetlabs:unbound:1.4.6:*:*:*:*:*:*:*
  • cpe:2.3:a:nlnetlabs:unbound:1.4.7:*:*:*:*:*:*:*
    cpe:2.3:a:nlnetlabs:unbound:1.4.7:*:*:*:*:*:*:*
  • cpe:2.3:a:nlnetlabs:unbound:1.4.8:*:*:*:*:*:*:*
    cpe:2.3:a:nlnetlabs:unbound:1.4.8:*:*:*:*:*:*:*
  • cpe:2.3:a:nlnetlabs:unbound:1.4.9:*:*:*:*:*:*:*
    cpe:2.3:a:nlnetlabs:unbound:1.4.9:*:*:*:*:*:*:*
CVSS
Base: 4.3 (as of 17-08-2017 - 01:34)
Impact:
Exploitability:
CWE CWE-399
CAPEC
Access
VectorComplexityAuthentication
NETWORK MEDIUM NONE
Impact
ConfidentialityIntegrityAvailability
NONE NONE PARTIAL
cvss-vector via4 AV:N/AC:M/Au:N/C:N/I:N/A:P
refmap via4
bid 47986
cert-vn VU#531342
confirm http://unbound.nlnetlabs.nl/downloads/CVE-2011-1922.txt
fedora FEDORA-2011-7555
osvdb 72750
secunia 44865
xf unbound-dns-dos(67645)
Last major update 17-08-2017 - 01:34
Published 31-05-2011 - 20:55
Last modified 17-08-2017 - 01:34
Back to Top