187
VMScore

CVE-2020-28935

Published: 07/12/2020 Updated: 29/03/2023
CVSS v2 Base Score: 2.1 | Impact Score: 2.9 | Exploitability Score: 3.9
CVSS v3 Base Score: 5.5 | Impact Score: 3.6 | Exploitability Score: 1.8
VMScore: 187
Vector: AV:L/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

NLnet Labs Unbound, up to and including version 1.12.0, and NLnet Labs NSD, up to and including version 4.3.3, contain a local vulnerability that would allow for a local symlink attack. When writing the PID file, Unbound and NSD create the file if it is not there, or open an existing file for writing. In case the file was already present, they would follow symlinks if the file happened to be a symlink instead of a regular file. An additional chown of the file would then take place after it was written, making the user Unbound/NSD is supposed to run as the new owner of the file. If an attacker has local access to the user Unbound/NSD runs as, she could create a symlink in place of the PID file pointing to a file that she would like to erase. If then Unbound/NSD is killed and the PID file is not cleared, upon restarting with root privileges, Unbound/NSD will rewrite any file pointed at by the symlink. This is a local vulnerability that could create a Denial of Service of the system Unbound/NSD is running on. It requires an attacker having access to the limited permission user Unbound/NSD runs as and point through the symlink to a critical file on the system.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

nlnetlabs unbound

nlnetlabs name server daemon

debian debian linux 9.0

Vendor Advisories

Synopsis Moderate: unbound security update Type/Severity Security Advisory: Moderate Red Hat Insights patch analysis Identify and remediate systems affected by this advisory View affected systems Topic An update for unbound is now available for Red Hat Enterprise Linux 82 Extended Update SupportRed Hat Product Security has rated ...
Debian Bug report logs - #977165 unbound: CVE-2020-28935 Package: src:unbound; Maintainer for src:unbound is unbound packagers <unbound@packagesdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Fri, 11 Dec 2020 22:45:02 UTC Severity: important Tags: security, upstream Found in version unbound ...
A flaw was found in unbound An integer overflow in regional_alloc function may lead to a buffer overflow of the allocated buffer if the size can be controlled by an attacker and can be big enough The highest threat from this vulnerability is to data confidentiality and integrity as well as service availability (CVE-2019-25032) A flaw was found i ...
NLnet Labs Unbound, up to and including version 1120, and NLnet Labs NSD, up to and including version 433, contain a local vulnerability that would allow for a local symlink attack When writing the PID file, Unbound and NSD create the file if it is not there, or open an existing file for writing In case the file was already present, they woul ...