SB2020063003 - OpenSUSE Linux update for unbound
Published: June 30, 2020
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 3 secuirty vulnerabilities.
1) OS Command Injection (CVE-ID: CVE-2019-18934)
The vulnerability allows a remote attacker to execute arbitrary shell commands on the target system.
The vulnerability exists due to insufficient validation of user-supplied input in the ipsec module. A remote attacker can pass specially crafted input to the application and execute arbitrary commands on the system.Successful exploitation of he vulnerability requires that unbound is compiled with `--enable-ipsecmod` support, and ipsecmod is enabled and used in the configuration.
2) Input validation error (CVE-ID: CVE-2020-12662)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input when processing DNS responses. A remote attacker who controls a malicious DNS server can send a specially crafted response and perform a denial of service (DoS) attack against third-party DNS servers.
The attack is triggered by random subdomains in the NSDNAME in NS records.
3) Infinite loop (CVE-ID: CVE-2020-12663)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to infinite loop when parsing DNS responses. A remote attacker can send a specially crafted DNS response to the server, consume all available system resources and cause denial of service conditions.
Remediation
Install update from vendor's website.