First published: Wed Jun 10 2020(Updated: )
An incomplete fix for CVE-2020-12662 was shipped for Unbound in Red Hat Enterprise Linux 7, as part of erratum RHSA-2020:2414. Vulnerable versions of Unbound could still amplify an incoming query into a large number of queries directed to a target, even with a lower amplification ratio compared to versions of Unbound that shipped before the mentioned erratum. This issue is about the incomplete fix for CVE-2020-12662, and it does not affect upstream versions of Unbound.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Nlnetlabs Unbound | =1.6.6-5 | |
Redhat Enterprise Linux | =7.0 | |
redhat/unbound | <1.6.6-5.el7_8 | 1.6.6-5.el7_8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-10772 is a vulnerability in Unbound, a DNS resolver, that allows for amplification of incoming queries directed at a target.
Versions 1.6.6-5 of Unbound are affected by CVE-2020-10772.
CVE-2020-10772 has a severity rating of 7.5 (high).
CVE-2020-10772 can be exploited by sending a specially crafted query to a vulnerable Unbound server, resulting in amplification of the query and redirecting a large number of queries to a target.
To fix CVE-2020-10772, upgrade to version 1.6.6-5.el7_8 or later of Unbound.