发布时间: 2022年8月13日
修改时间: 2024年10月31日
NLnet Labs Unbound, up to and including version 1.16.1 is vulnerable to a novel type of the ghost domain names attack. The vulnerability works by targeting an Unbound instance. Unbound is queried for a subdomain of a rogue domain name. The rogue nameserver returns delegation information for the subdomain that updates Unbound s delegation cache. This action can be repeated before expiry of the delegation information by querying Unbound for a second level subdomain which the rogue nameserver provides new delegation information. Since Unbound is a child-centric resolver, the ever-updating child delegation information can keep a rogue domain name resolvable long after revocation. From version 1.16.2 on, Unbound checks the validity of parent delegation records before using cached delegation information.
NVD | openEuler | |
---|---|---|
Confidentiality | High | High |
Attack Vector | Network | Network |
CVSS评分 | 6.5 | 6.5 |
Attack Complexity | Low | Low |
Privileges Required | Low | Low |
Scope | Unchanged | Unchanged |
Integrity | None | None |
User Interaction | None | None |
Availability | None | None |
公告名 | 概要 | 发布时间 |
---|---|---|
KylinSec-SA-2022-1905 | unbound security update | 2022年8月13日 |
产品 | 包 | 状态 |
---|---|---|
KY3.4-4A | unbound | Fixed |
KY3.4-5A | unbound | Fixed |
KY3.5.1 | unbound | Fixed |