CVE Vulnerabilities

CVE-2024-1488

Incorrect Default Permissions

Published: Feb 15, 2024 | Modified: Jan 30, 2025
CVSS 3.x
7.3
HIGH
Source:
NVD
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
CVSS 2.x
RedHat/V2
RedHat/V3
8 IMPORTANT
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

A vulnerability was found in Unbound due to incorrect default permissions, allowing any process outside the unbound group to modify the unbound runtime configuration. If a process can connect over localhost to port 8953, it can alter the configuration of unbound.service. This flaw allows an unprivileged attacker to manipulate a running instance, potentially altering forwarders, allowing them to track all queries forwarded by the local resolver, and, in some cases, disrupting resolving altogether.

Weakness

During installation, installed file permissions are set to allow anyone to modify those files.

Affected Software

NameVendorStart VersionEnd Version
UnboundFedoraproject*1.19.1-2.fc40 (excluding)
Red Hat Enterprise Linux 8RedHatunbound-0:1.16.2-5.el8_9.6*
Red Hat Enterprise Linux 8RedHatunbound-0:1.16.2-5.8.el8_10*
Red Hat Enterprise Linux 8.2 Advanced Update SupportRedHatunbound-0:1.7.3-12.el8_2.1*
Red Hat Enterprise Linux 8.2 Telecommunications Update ServiceRedHatunbound-0:1.7.3-12.el8_2.1*
Red Hat Enterprise Linux 8.2 Update Services for SAP SolutionsRedHatunbound-0:1.7.3-12.el8_2.1*
Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update SupportRedHatunbound-0:1.7.3-15.el8_4.1*
Red Hat Enterprise Linux 8.4 Telecommunications Update ServiceRedHatunbound-0:1.7.3-15.el8_4.1*
Red Hat Enterprise Linux 8.4 Update Services for SAP SolutionsRedHatunbound-0:1.7.3-15.el8_4.1*
Red Hat Enterprise Linux 8.6 Extended Update SupportRedHatunbound-0:1.7.3-17.el8_6.4*
Red Hat Enterprise Linux 8.8 Extended Update SupportRedHatunbound-0:1.16.2-5.el8_8.4*
Red Hat Enterprise Linux 9RedHatunbound-0:1.16.2-3.el9_3.5*
Red Hat Enterprise Linux 9.0 Extended Update SupportRedHatunbound-0:1.13.1-13.el9_0.4*
Red Hat Enterprise Linux 9.2 Extended Update SupportRedHatunbound-0:1.16.2-3.el9_2.4*
UnboundUbuntubionic*
UnboundUbuntutrusty*
UnboundUbuntuxenial*

Potential Mitigations

  • Compartmentalize the system to have “safe” areas where trust boundaries can be unambiguously drawn. Do not allow sensitive data to go outside of the trust boundary and always be careful when interfacing with a compartment outside of the safe area.
  • Ensure that appropriate compartmentalization is built into the system design, and the compartmentalization allows for and reinforces privilege separation functionality. Architects and designers should rely on the principle of least privilege to decide the appropriate time to use privileges and the time to drop privileges.

References