漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
Vulnerability Title
Heap overflow with multiple NSID, COOKIE, PADDING EDNS options
Vulnerability Description
NLnet Labs Unbound 1.14.0 up to and including version 1.25.0 has a vulnerability that results in heap overflow when encoding multiple NSID and/or DNS Cookie EDNS and/or EDNS Padding options in the reply packet. The relevant options ('nsid', 'answer-cookie', 'pad-responses' (default)) need to be enabled for the vulnerability to be exploited. An adversary who can query Unbound can exploit the vulnerability by attaching multiple NSID and/or DNS Cookie EDNS and/or EDNS Padding options to the query. A flaw in the size calculation of the EDNS field truncates the correct value which allows the encoder to overflow the available space when writing. Those two combined lead to a heap overflow write of Unbound controlled data and eventually a crash. Unbound 1.25.1 contains a patch with a fix to de-duplicate the EDNS options and a fix to prevent truncation of the EDNS field size calculation.
CVSS Information
N/A
Vulnerability Type
数值截断错误
Vulnerability Title
NLnet Labs Unbound 安全漏洞
Vulnerability Description
NLnet Labs Unbound是NLnet Labs开源的一个高性能DNS解析器。 NLnet Labs Unbound 1.14.0版本至1.25.0版本存在安全漏洞,该漏洞源于编码多个NSID和/或DNS Cookie EDNS和/或EDNS Padding选项时大小计算截断导致堆溢出,攻击者通过附加多个选项到查询可触发堆溢出写入并导致崩溃。
CVSS Information
N/A
Vulnerability Type
N/A