CVE Vulnerabilities

CVE-2024-1488

External Control of System or Configuration Setting

Published: Feb 15, 2024 | Modified: May 08, 2024
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
RedHat/V2
RedHat/V3
8 IMPORTANT
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H
Ubuntu
MEDIUM

A vulnerability was found in Unbound due to incorrect default permissions, allowing any process outside the unbound group to modify the unbound runtime configuration. If a process can connect over localhost to port 8953, it can alter the configuration of unbound.service. This flaw allows an unprivileged attacker to manipulate a running instance, potentially altering forwarders, allowing them to track all queries forwarded by the local resolver, and, in some cases, disrupting resolving altogether.

Weakness

One or more system settings or configuration elements can be externally controlled by a user.

Affected Software

Name Vendor Start Version End Version
Red Hat Enterprise Linux 8 RedHat unbound-0:1.16.2-5.el8_9.6 *
Red Hat Enterprise Linux 8.2 Advanced Update Support RedHat unbound-0:1.7.3-12.el8_2.1 *
Red Hat Enterprise Linux 8.2 Telecommunications Update Service RedHat unbound-0:1.7.3-12.el8_2.1 *
Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions RedHat unbound-0:1.7.3-12.el8_2.1 *
Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support RedHat unbound-0:1.7.3-15.el8_4.1 *
Red Hat Enterprise Linux 8.4 Telecommunications Update Service RedHat unbound-0:1.7.3-15.el8_4.1 *
Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions RedHat unbound-0:1.7.3-15.el8_4.1 *
Red Hat Enterprise Linux 8.6 Extended Update Support RedHat unbound-0:1.7.3-17.el8_6.4 *
Red Hat Enterprise Linux 8.8 Extended Update Support RedHat unbound-0:1.16.2-5.el8_8.4 *
Red Hat Enterprise Linux 9 RedHat unbound-0:1.16.2-3.el9_3.5 *
Red Hat Enterprise Linux 9.0 Extended Update Support RedHat unbound-0:1.13.1-13.el9_0.4 *
Red Hat Enterprise Linux 9.2 Extended Update Support RedHat unbound-0:1.16.2-3.el9_2.4 *
Unbound Ubuntu bionic *
Unbound Ubuntu trusty *
Unbound Ubuntu xenial *

Potential Mitigations

  • Compartmentalize the system to have “safe” areas where trust boundaries can be unambiguously drawn. Do not allow sensitive data to go outside of the trust boundary and always be careful when interfacing with a compartment outside of the safe area.
  • Ensure that appropriate compartmentalization is built into the system design, and the compartmentalization allows for and reinforces privilege separation functionality. Architects and designers should rely on the principle of least privilege to decide the appropriate time to use privileges and the time to drop privileges.

References