A vulnerability was found in Unbound due to incorrect default permissions, allowing any process outside the unbound group to modify the unbound runtime configuration. If a process can connect over localhost to port 8953, it can alter the configuration of unbound.service. This flaw allows an unprivileged attacker to manipulate a running instance, potentially altering forwarders, allowing them to track all queries forwarded by the local resolver, and, in some cases, disrupting resolving altogether.
One or more system settings or configuration elements can be externally controlled by a user.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Red Hat Enterprise Linux 8 | RedHat | unbound-0:1.16.2-5.el8_9.6 | * |
Red Hat Enterprise Linux 8.2 Advanced Update Support | RedHat | unbound-0:1.7.3-12.el8_2.1 | * |
Red Hat Enterprise Linux 8.2 Telecommunications Update Service | RedHat | unbound-0:1.7.3-12.el8_2.1 | * |
Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions | RedHat | unbound-0:1.7.3-12.el8_2.1 | * |
Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support | RedHat | unbound-0:1.7.3-15.el8_4.1 | * |
Red Hat Enterprise Linux 8.4 Telecommunications Update Service | RedHat | unbound-0:1.7.3-15.el8_4.1 | * |
Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions | RedHat | unbound-0:1.7.3-15.el8_4.1 | * |
Red Hat Enterprise Linux 8.6 Extended Update Support | RedHat | unbound-0:1.7.3-17.el8_6.4 | * |
Red Hat Enterprise Linux 8.8 Extended Update Support | RedHat | unbound-0:1.16.2-5.el8_8.4 | * |
Red Hat Enterprise Linux 9 | RedHat | unbound-0:1.16.2-3.el9_3.5 | * |
Red Hat Enterprise Linux 9.0 Extended Update Support | RedHat | unbound-0:1.13.1-13.el9_0.4 | * |
Red Hat Enterprise Linux 9.2 Extended Update Support | RedHat | unbound-0:1.16.2-3.el9_2.4 | * |
Unbound | Ubuntu | bionic | * |
Unbound | Ubuntu | trusty | * |
Unbound | Ubuntu | xenial | * |