First published: Tue Apr 27 2021(Updated: )
** DISPUTED ** Unbound before 1.9.5 allows an out-of-bounds write via a compressed name in rdata_copy. NOTE: The vendor disputes that this is a vulnerability. Although the code may be vulnerable, a running Unbound installation cannot be remotely or locally exploited.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Nlnetlabs Unbound | <1.9.5 | |
Debian Debian Linux | =9.0 | |
<1.9.5 | ||
=9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2019-25042.
The severity of CVE-2019-25042 is critical with a severity value of 9.8.
Unbound versions before 1.9.5 and Debian Linux 9.0 are affected by CVE-2019-25042.
CVE-2019-25042 is an out-of-bounds write vulnerability in Unbound before 1.9.5, which allows an attacker to write beyond the allocated memory.
Yes, the vendor disputes that CVE-2019-25042 is a vulnerability, although the code may still be vulnerable.
No, a running Unbound installation cannot be remotely or locally exploited through CVE-2019-25042.
To fix CVE-2019-25042, upgrade to Unbound version 1.9.5 or later.
You can find more information about CVE-2019-25042 in the following references: [Reference 1](https://lists.debian.org/debian-lts-announce/2021/05/msg00007.html), [Reference 2](https://ostif.org/our-audit-of-unbound-dns-by-x41-d-sec-full-results/), [Reference 3](https://security.netapp.com/advisory/ntap-20210507-0007/).