First published: Thu Oct 03 2019(Updated: )
Unbound before 1.9.4 accesses uninitialized memory, which allows remote attackers to trigger a crash via a crafted NOTIFY query. The source IP address of the query must match an access-control rule.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/unbound | <=1.9.3-1<=1.9.0-2 | 1.9.4-1 1.9.0-2+deb10u1 |
Nlnetlabs Unbound | <1.9.4 | |
Canonical Ubuntu Linux | =19.04 | |
ubuntu/unbound | <1.9.0-2ubuntu0.1 | 1.9.0-2ubuntu0.1 |
debian/unbound | 1.13.1-1+deb11u2 1.17.1-2+deb12u2 1.20.0-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-16866 is a vulnerability in Unbound before version 1.9.4 that allows remote attackers to trigger a crash via a crafted NOTIFY query by accessing uninitialized memory.
CVE-2019-16866 affects Unbound versions before 1.9.4.
CVE-2019-16866 has a severity rating of 7.5 (High).
To fix CVE-2019-16866, update Unbound to version 1.9.4 or higher.
More information about CVE-2019-16866 can be found at the following references: [CVE-2019-16866](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16866), [NLnetlabs](https://nlnetlabs.nl/downloads/unbound/CVE-2019-16866.txt), [GitHub](https://github.com/NLnetLabs/unbound/blob/release-1.9.4/doc/Changelog).