6.5
CVSSv3

CVE-2022-30699

Published: 01/08/2022 Updated: 12/08/2022
CVSS v3 Base Score: 6.5 | Impact Score: 3.6 | Exploitability Score: 2.8

Vulnerability Summary

NLnet Labs Unbound, up to and including version 1.16.1, is vulnerable to a novel type of the "ghost domain names" attack. The vulnerability works by targeting an Unbound instance. Unbound is queried for a rogue domain name when the cached delegation information is about to expire. The rogue nameserver delays the response so that the cached delegation information is expired. Upon receiving the delayed answer containing the delegation information, Unbound overwrites the now expired entries. This action can be repeated when the delegation information is about to expire making the rogue delegation information ever-updating. From version 1.16.2 on, Unbound stores the start time for a query and uses that to decide if the cached delegation information can be overwritten.

Most Upvoted Vulmon Research Post

There is no Researcher post for this vulnerability
Would you like to share something about it? Sign up now to share your knowledge with the community.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

nlnetlabs unbound

Vendor Advisories

Debian Bug report logs - #1016493 unbound: CVE-2022-30698 CVE-2022-30699 Package: src:unbound; Maintainer for src:unbound is unbound packagers <unbound@packagesdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Mon, 1 Aug 2022 19:48:01 UTC Severity: important Tags: security, upstream Found in ...
NLnet Labs Unbound, up to and including version 1161, is vulnerable to a novel type of the "ghost domain names" attack The vulnerability works by targeting an Unbound instance Unbound is queried for a rogue domain name when the cached delegation information is about to expire The rogue nameserver delays the response so that t ...