CVE Vulnerabilities

CVE-2022-30699

Insufficient Session Expiration

Published: Aug 01, 2022 | Modified: Nov 07, 2023
CVSS 3.x
6.5
MEDIUM
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
CVSS 2.x
RedHat/V2
RedHat/V3
6.5 MODERATE
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Ubuntu
MEDIUM

NLnet Labs Unbound, up to and including version 1.16.1, is vulnerable to a novel type of the ghost domain names attack. The vulnerability works by targeting an Unbound instance. Unbound is queried for a rogue domain name when the cached delegation information is about to expire. The rogue nameserver delays the response so that the cached delegation information is expired. Upon receiving the delayed answer containing the delegation information, Unbound overwrites the now expired entries. This action can be repeated when the delegation information is about to expire making the rogue delegation information ever-updating. From version 1.16.2 on, Unbound stores the start time for a query and uses that to decide if the cached delegation information can be overwritten.

Weakness

According to WASC, “Insufficient Session Expiration is when a web site permits an attacker to reuse old session credentials or session IDs for authorization.”

Affected Software

Name Vendor Start Version End Version
Unbound Nlnetlabs * 1.16.2 (excluding)
Red Hat Enterprise Linux 8 RedHat unbound-0:1.16.2-2.el8 *
Red Hat Enterprise Linux 8.6 Extended Update Support RedHat unbound-0:1.7.3-17.el8_6.5 *
Red Hat Enterprise Linux 9 RedHat unbound-0:1.16.2-2.el9 *
Unbound Ubuntu bionic *
Unbound Ubuntu devel *
Unbound Ubuntu esm-infra-legacy/trusty *
Unbound Ubuntu esm-infra/xenial *
Unbound Ubuntu focal *
Unbound Ubuntu jammy *
Unbound Ubuntu kinetic *
Unbound Ubuntu lunar *
Unbound Ubuntu mantic *
Unbound Ubuntu noble *
Unbound Ubuntu oracular *
Unbound Ubuntu trusty *
Unbound Ubuntu trusty/esm *
Unbound Ubuntu upstream *
Unbound Ubuntu xenial *

Potential Mitigations

References