5.3
CVSSv3

CVE-2017-15105

Published: 23/01/2018 Updated: 09/10/2019
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 5.3 | Impact Score: 1.4 | Exploitability Score: 3.9
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N

Vulnerability Summary

A flaw was found in the way unbound prior to 1.6.8 validated wildcard-synthesized NSEC records. An improperly validated wildcard NSEC record could be used to prove the non-existence (NXDOMAIN answer) of an existing wildcard record, or trick unbound into accepting a NODATA proof.

Vulnerable Product Search on Vulmon Subscribe to Product

nlnetlabs unbound

debian debian linux 8.0

debian debian linux 7.0

canonical ubuntu linux 16.04

canonical ubuntu linux 14.04

canonical ubuntu linux 18.04

canonical ubuntu linux 17.10

Vendor Advisories

Debian Bug report logs - #887733 unbound: CVE-2017-15105: vulnerability in the processing of wildcard synthesized NSEC records Package: src:unbound; Maintainer for src:unbound is unbound packagers <unbound@packagesdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Fri, 19 Jan 2018 13:57:02 UTC ...
A security issue was fixed in Unbound ...
A flaw was found in the way unbound validated wildcard-synthesized NSEC records An improperly validated wildcard NSEC record could be used to prove the non-existence (NXDOMAIN answer) of an existing wildcard record, or trick unbound into accepting a NODATA proof ...

Github Repositories

A DNSSEC validating stub resolver for Java.

Archival notice dnssecjava was merged into dnsjava and is a built-in resolver from v350 on dnssecjava A DNSSEC validating stub resolver for Java Is this library safe to use? Maybe There's been no audit of the code so far, so there are absolutely no guarantees The rest depends currently on your use case: the proof that a positive response is correct should be saf