UNBOUND
- About
- Download
- Support
- RFC Compliance
- Security Advisories
We take security very seriously. If you have found a security issue in Unbound, please submit a security report.
Possible arbitrary code execution during DNSSEC validation
| Date: | 2026-05-20 |
|---|---|
| CVE: | CVE-2026-33278 |
| Credit: | Qifan Zhang from Palo Alto Networks |
| Affects: | Unbound 1.19.1 up to and including version 1.25.0 |
| Not affected: | Other versions |
| Severity: | Critical |
| Impact: | Denial of service (daemon crash); possibility of arbitrary code execution |
| Solution: | Download patched version of Unbound, or apply the patch manually |
A vulnerability was found in Unbound's DNSSEC validator that enables denial of service and possible remote code execution as a result of deep copying a data structure and erroneously overwriting a destination pointer.
An adversary can exploit the vulnerability by controlling a malicious signed zone and querying a vulnerable Unbound. When DS sub-queries need to suspend validation due to NSEC3 computational budget exhaustion (introduced in Unbound 1.19.1), Unbound deep-copies response messages to preserve them across memory region teardown. A struct-assignment bug overwrites the destination's pointer with the source's pointer. After the sub-query region is freed, the resumed validator dereferences this dangling pointer, triggering a crash or potentially enabling arbitrary code execution.
Unbound 1.25.1 contains a patch with a fix to preserve the correct pointer when deep copying the data structure.
There are two patches available that address the issue:
- minimal patch,
- complete patch (accompanying code improvements/tests)
If you cannot upgrade you can apply EITHER of the above patches manually on the Unbound source directory with patch -p1 < patch_CVE-2026-33278.diff.
This is part of the 1.25.1 security release containing multiple fixes. The combined patch can be applied INSTEAD to address all of them. A minimal version also exists for easier patching.
Heap overflow with multiple NSID, COOKIE, PADDING EDNS options
| Date: | 2026-05-20 |
|---|---|
| CVE: | CVE-2026-42944 |
| Credit: | Qifan Zhang from Palo Alto Networks |
| Affects: | Unbound 1.14.0 up to and including version 1.25.0 |
| Not affected: | Other versions |
| Severity: | High |
| Impact: | Denial of service (daemon crash) |
| Solution: | Download patched version of Unbound, or apply the patch manually |
A vulnerability was found in Unbound that results in heap overflow when encoding multiple NSID and/or DNS Cookie EDNS and/or EDNS Padding options in the reply packet. The relevant options (nsid, answer-cookie, pad-responses (default)) need to be enabled for the vulnerability to be exploited.
An adversary who can query Unbound can exploit the vulnerability by attaching multiple NSID and/or DNS Cookie EDNS and/or EDNS Padding options to the query.
A flaw in the size calculation of the EDNS field truncates the correct value which allows the encoder to overflow the available space when writing.
Those two combined lead to a heap overflow write of Unbound controlled data and eventually a crash.
Unbound 1.25.1 contains a patch with a fix to de-duplicate the EDNS options and a fix to prevent truncation of the EDNS field size calculation.
There are two patches available that address the issue:
- minimal patch,
- complete patch (accompanying code improvements/tests)
If you cannot upgrade you can apply EITHER of the above patches manually on the Unbound source directory with patch -p1 < patch_CVE-2026-42944.diff.
This is part of the 1.25.1 security release containing multiple fixes. The combined patch can be applied INSTEAD to address all of them. A minimal version also exists for easier patching.
Crash during DNSSEC validation of malicious content
| Date: | 2026-05-20 |
|---|---|
| CVE: | CVE-2026-42959 |
| Credit: | Qifan Zhang from Palo Alto Networks |
| Affects: | Unbound up to and including version 1.25.0 |
| Not affected: | Other versions |
| Severity: | High |
| Impact: | Denial of service (daemon crash) |
| Solution: | Download patched version of Unbound, or apply the patch manually |
A denial of service vulnerability was found in Unbound's DNSSEC validator that can lead to a crash given malicious upstream replies.
When Unbound constructs chase-reply messages for validation, the code uses the wrong counter to calculate write offsets for ADDITIONAL section rrsets. DNAME duplication could increase the ANSWER section count and authority filtering could decrease the AUTHORITY section count and create an uninitialized array slot. Combining these two, the validator later dereferences this uninitialized pointer, causing an immediate process crash.
An adversary controlling a DNSSEC-signed domain can trigger this bug with a single query by configuring a DNAME chain with unsigned CNAMEs and a response containing unsigned AUTHORITY records alongside signed ADDITIONAL glue records.
Unbound 1.25.1 contains a patch with a fix to use the proper counters to calculate the write offsets.
If you cannot upgrade you can apply the patch manually on the Unbound source directory with patch -p1 < patch_CVE-2026-42959.diff.
This is part of the 1.25.1 security release containing multiple fixes. The combined patch can be applied INSTEAD to address all of them. A minimal version also exists for easier patching.
Packet of death with DNSCrypt
| Date: | 2026-05-20 |
|---|---|
| CVE: | CVE-2026-32792 |
| Credit: | Andrew Griffiths from 'calif.io' |
| Affects: | Unbound 1.6.2 up to and including version 1.25.0 |
| Not affected: | Other versions |
| Severity: | Medium |
| Impact: | Denial of service (daemon crash; low feasibility) |
| Solution: | Download patched version of Unbound, or apply the patch manually |
A denial of service vulnerability has been discovered in Unbound when compiled with DNSCrypt support (--enable-dnscrypt). A bad DNSCrypt query could underflow Unbound's DNSCrypt packet reading procedure that may lead to heap overflow.
A malicious actor can exploit the vulnerability with a single bad DNSCrypt query that its decrypted plaintext consists entirely of 0x00 bytes and does not contain the expected 0x80 marker.
Unbound would then start reading more bytes than necessary until it finds a non-0x00 byte. Based on the underlying memory allocator and the memory layout, it could lead to heap overflow while reading followed by a crash.
Likelihood of a crash is low, since it relies heavily on the underlying memory allocator and the memory layout.
If the heap overflow does not happen, Unbound's later packet checks will deny the packet.
Unbound 1.25.1 contains a patch with a fix to bound reading in the given buffer space.
If you cannot upgrade you can apply the patch manually on the Unbound source directory with patch -p1 < patch_CVE-2026-32792.diff.
This is part of the 1.25.1 security release containing multiple fixes. The combined patch can be applied INSTEAD to address all of them. A minimal version also exists for easier patching.
Another "ghost domain names" attack variant
| Date: | 2026-05-20 |
|---|---|
| CVE: | CVE-2026-40622 |
| Credit: | Qifan Zhang from Palo Alto Networks |
| Affects: | Unbound 1.16.2 up to and including version 1.25.0 |
| Not affected: | Other versions |
| Severity: | Medium |
| Impact: | Remote attackers can prolong (once) resolvability of revoked domain names |
| Solution: | Download patched version of Unbound, or apply the patch manually |
A vulnerability in the "ghost domain names" family of attacks was found in Unbound that could extend the ghost domain window by up to one cached TTL configured value.
Similar to other "ghost domain names" attacks, an adversary needs to control a (ghost) zone and be able to query a vulnerable Unbound. A single client NS query can cause Unbound to overwrite the cached expired parent-side referral NS rrset with the child-side apex NS rrset and essentially extend the ghost domain window by up to one cached TTL configured value (cache-max-ttl). In configurations where harden-referral-path: yes is used (non-default configuration), no client NS query is required since Unbound implicitly performs that query.
Unbound 1.25.1 contains a patch with a fix that does not allow extension of TTLs for (parent) NS records regardless of their trust.
If you cannot upgrade you can apply the patch manually on the Unbound source directory with patch -p1 < patch_CVE-2026-40622.diff.
This is part of the 1.25.1 security release containing multiple fixes. The combined patch can be applied INSTEAD to address all of them. A minimal version also exists for easier patching.
Long list of incoming EDNS options degrades performance
| Date: | 2026-05-20 |
|---|---|
| CVE: | CVE-2026-41292 |
| Credit: | GitHub user 'N0zoM1z0' <https://github.com/N0zoM1z0>-- |
| Additional credit: | |
| Qifan Zhang from Palo Alto Networks | |
| Affects: | Unbound up to and including version 1.25.0 |
| Not affected: | Other versions |
| Severity: | Medium |
| Impact: | Denial of service |
| Solution: | Download patched version of Unbound, or apply the patch manually |
A degradation of service attack has been discovered in Unbound related to parsing long lists of incoming EDNS options.
An adversary sending queries with too many EDNS options can hold Unbound threads hostage while they are parsing and creating internal data structures for the options. Coordinated attacks can result in degradation and/or denial of service.
Unbound 1.25.1 contains a patch with a fix to limit acceptable incoming EDNS options (100).
If you cannot upgrade you can apply the patch manually on the Unbound source directory with patch -p1 < patch_CVE-2026-41292.diff.
This is part of the 1.25.1 security release containing multiple fixes. The combined patch can be applied INSTEAD to address all of them. A minimal version also exists for easier patching.
Jostle logic bypass degrades resolution performance
| Date: | 2026-05-20 |
|---|---|
| CVE: | CVE-2026-42534 |
| Credit: | Qifan Zhang from Palo Alto Networks |
| Affects: | Unbound up to and including version 1.25.0 |
| Not affected: | Other versions |
| Severity: | Medium |
| Impact: | Possible denial of resolution service |
| Solution: | Download patched version of Unbound, or apply the patch manually |
A vulnerability was found in Unbound's jostle logic that could defeat its purpose and degrade resolution performance. Retransmits of the same query could renew the age of slow running queries and not allow the jostle logic to see them as aged and potential targets for replacement with new queries.
An adversary who can query a vulnerable Unbound and who can control a domain name server that replies slowly and/or maliciously to Unbound's queries can exploit the vulnerability and degrade the resolution performance of Unbound.
When Unbound's num-queries-per-thread reaches its limit, the jostle logic kicks in. When a new query comes in, half of the available queries that are also slow to resolve are candidates for replacement. The vulnerability then happens because duplicate queries that need resolution would skew the aging result by using the timestamp of the latest duplicate query instead of the original one that started the resolution effort.
Cache and local data response performance remains unaffected.
Coordinated attacks could raise this to a denial of resolution service.
Unbound 1.25.1 contains a patch with a fix to attach an initial, non-updatable start time for incoming queries that allow the jostle logic to work as intended.
If you cannot upgrade you can apply the patch manually on the Unbound source directory with patch -p1 < patch_CVE-2026-42534.diff.
This is part of the 1.25.1 security release containing multiple fixes. The combined patch can be applied INSTEAD to address all of them. A minimal version also exists for easier patching.
Degradation of service with unbounded NSEC3 hash calculations
| Date: | 2026-05-20 |
|---|---|
| CVE: | CVE-2026-42923 |
| Credit: | Qifan Zhang from Palo Alto Networks |
| Affects: | Unbound up to and including version 1.25.0 |
| Not affected: | Other versions |
| Severity: | Medium |
| Impact: | Possibility of DoS in orchestrated attacks |
| Solution: | Download patched version of Unbound, or apply the patch manually |
A vulnerability in Unbound's DNSSEC validator was found where the code path to consult the negative cache for DS records does not take into account the limit on NSEC3 hash calculations introduced in 1.19.1. This leads to degradation of service during the attack.
An adversary that controls a DNSSEC signed zone can exploit this by signing NSEC3 records with acceptably high iterations for child delegations and querying a vulnerable Unbound. Unbound will keep performing the allowed hash calculations on the NSEC3 records and will not limit the work by the mitigation introduced in 1.19.1. As a side effect, a global lock for the negative cache will be held for the duration of the hashing, blocking other threads that need to consult the negative cache.
Coordinated attacks could raise the vulnerability to denial of service.
Unbound 1.25.1 contains a patch with a fix to bound the vulnerable code path with the existing limit for NSEC3 hash calculations.
If you cannot upgrade you can apply the patch manually on the Unbound source directory with patch -p1 < patch_CVE-2026-42923.diff.
This is part of the 1.25.1 security release containing multiple fixes. The combined patch can be applied INSTEAD to address all of them. A minimal version also exists for easier patching.
Possible cache poisoning via promiscuous records for the authority section
| Date: | 2026-05-20 |
|---|---|
| CVE: | CVE-2026-42960 |
| Credit: | TaoFei Guo from Peking University, Yang Luo and JianJun Chen from Tsinghua University |
| Affects: | Unbound up to and including version 1.25.0 |
| Not affected: | Other versions |
| Severity: | Medium |
| Impact: | Cache poisoning |
| Solution: | Download patched version of Unbound, or apply the patch manually |
(complement fix to CVE-2025-11411)
Promiscuous RRSets that complement DNS replies in the authority section can be used to trick Unbound to cache such records. If an adversary is able to attach such records in a reply (i.e., spoofed packet, fragmentation attack) he would be able to poison Unbound's cache.
A malicious actor can exploit the possible poisonous effect by injecting RRSets other than NS that are also accompanied by address records in a reply, for example MX. This could be achieved by trying to spoof a reply packet or fragmentation attacks.
Unbound would then accept the relative address records in the additional section and cache them if the authority RRSet has enough trust at this point, i.e., in-zone data for the delegation point.
Unbound 1.25.1 contains a patch with a fix that disregards address records from the additional section if they are not explicitly relevant only to authority NS records, mitigating the possible poison effect.
If you cannot upgrade you can apply the patch manually on the Unbound source directory with patch -p1 < patch_CVE-2026-42960.diff.
This is part of the 1.25.1 security release containing multiple fixes. The combined patch can be applied INSTEAD to address all of them. A minimal version also exists for easier patching.
Unbounded name compression in certain cases causes degradation of service
| Date: | 2026-05-20 |
|---|---|
| CVE: | CVE-2026-44390 |
| Credit: | Qifan Zhang from Palo Alto Networks |
| Affects: | Unbound up to and including version 1.25.0 |
| Not affected: | Other versions |
| Severity: | Medium |
| Impact: | Possibility of DoS in orchestrated attacks |
| Solution: | Download patched version of Unbound, or apply the patch manually |
(complement fix to CVE-2024-8508)
A vulnerability has been discovered in Unbound when handling replies with very large RRsets that Unbound needs to perform name compression for.
Malicious upstream responses with very large RRsets with records that don't share a suffix above the root can cause Unbound to spend a considerable time applying name compression to downstream replies. This can lead to degraded performance and eventually denial of service in well orchestrated attacks.
An adversary can exploit the vulnerability by querying Unbound for the specially crafted contents of a malicious zone with very large RRsets. Before Unbound replies to the query it will try to apply name compression which was an unbounded operation that could lock the CPU until the whole packet was complete.
A compression limit was introduced in 1.21.1 for this but it didn't account for the case where records would not share any suffix above the root. That causes Unbound to go in a different code path because of the compression tree lookup failure and eventually not increment the compression counter for those operations.
Unbound 1.25.1 contains a patch with a fix that increments the compression counter regardless of the compression tree lookup.
If you cannot upgrade you can apply the patch manually on the Unbound source directory with patch -p1 < patch_CVE-2026-44390.diff.
This is part of the 1.25.1 security release containing multiple fixes. The combined patch can be applied INSTEAD to address all of them. A minimal version also exists for easier patching.
Use after free and crash under special conditions in RPZ code
| Date: | 2026-05-20 |
|---|---|
| CVE: | CVE-2026-44608 |
| Credit: | Qifan Zhang from Palo Alto Networks |
| Affects: | Unbound 1.14.0 up to and including version 1.25.0 |
| Not affected: | Other versions |
| Severity: | Medium |
| Impact: | Denial of service (daemon crash) |
| Solution: | Download patched version of Unbound, or apply the patch manually |
A locking inconsistency vulnerability was found in Unbound that when certain conditions are met (multi-threaded, RPZ XFR reload, RPZ zone with rpz-nsip/rpz-nsdname triggers) it could result in heap use-after-free and eventual crash.
An adversary can exploit the vulnerability if conditions are first met on a vulnerable Unbound, i.e., multi-threaded, an RPZ zone with rpz-nsip/rpz-nsdname triggers and an ongoing XFR for that RPZ zone. Local RPZ files do not trigger the vulnerability.
If the timing is right and an XFR happens at the same time another thread needs to read that RPZ zone, the reader may not hold the lock long enough and the thread applying the XFR may free objects that the reader is about to walk causing the use-after-free.
Unbound 1.25.1 contains a patch with a fix to the locking code.
If you cannot upgrade you can apply the patch manually on the Unbound source directory with patch -p1 < patch_CVE-2026-44608.diff.
This is part of the 1.25.1 security release containing multiple fixes. The combined patch can be applied INSTEAD to address all of them. A minimal version also exists for easier patching.
Possible domain hijacking via promiscuous records in the authority section
| Date: | 2025-10-22 (updated: 2025-11-26) |
|---|---|
| CVE: | CVE-2025-11411 |
| Credit: | Yuxiao Wu, Yunyi Zhang, Baojun Liu and Haixin Duan from Tsinghua University |
| Additional credit: | |
| TaoFei Guo from Peking University, Yang Luo and JianJun Chen from Tsinghua University | |
| Affects: | Unbound up to and including version 1.24.1 |
| Not affected: | Other versions |
| Severity: | Medium |
| Impact: | Cache poisoning/Domain hijacking |
| Solution: | Download patched version of Unbound, or apply the patch manually |
Several multi-vendor cache poisoning vulnerabilities have been discovered in caching resolvers for non-DNSSEC protected data.
Unbound is vulnerable for some of these cases that could lead to domain hijacking.
Promiscuous NS RRSets that complement positive DNS replies in the authority section can be used to trick resolvers to update their delegation information for the zone. Usually these RRSets are used to update the resolver's knowledge of the zone's name servers.
A malicious actor can exploit the possible poisonous effect by injecting NS RRSets (and possibly their respective address records) in a reply. This could be done for example by trying to spoof a packet or fragmentation attacks.
Unbound would then proceed to update the NS RRSet data it already has since the new data has enough trust for it, i.e., in-zone data for the delegation point.
Unbound 1.24.1 includes a fix that scrubs unsolicited NS RRSets (and their respective address records) from replies mitigating the possible poison effect.
Update: Unbound 1.24.2 includes an additional fix that scrubs unsolicited NS RRSets (and their respective address records) from YXDOMAIN and non-referral nodata replies as well, mitigating the possible poison effect.
Unbound 1.24.2 fully addresses the vulnerability.
If you cannot upgrade you can also apply the individual patches in order: the 1.24.1 patch (applies on 1.24.0) and the 1.24.2 patch (applies on 1.24.1) manually. To do this, apply the patches on the Unbound source directory with patch -p1 < patch_CVE-2025-11411_option_tests.diff, and/or patch -p1 < patch_CVE-2025-11411_2_wtests.diff and then run make install to install Unbound.
Cache poisoning via the ECS-enabled Rebirthday Attack
| Date: | 2025-07-16 |
|---|---|
| CVE: | CVE-2025-5994 |
| Credit: | Xiang Li (AOSP Lab, Nankai University) |
| Affects: | Unbound 1.6.2 up to and including version 1.23.0 compiled and configured for ECS support |
| Not affected: | Other versions or all non-ECS enabled versions |
| Severity: | High |
| Impact: | Cache poisoning |
| Solution: | Download patched version of Unbound, or apply the patch manually |
A multi-vendor cache poisoning vulnerability named "Rebirthday Attack" has been discovered in caching resolvers that support EDNS Client Subnet (ECS). Unbound is also vulnerable when compiled with ECS support, i.e., --enable-subnet, AND configured to send ECS information along with queries to upstream name servers, i.e., at least one of the send-client-subnet, client-subnet-zone or client-subnet-always-forward options is used.
Resolvers supporting ECS need to segregate outgoing queries to accommodate for different outgoing ECS information. This re-opens up resolvers to a birthday paradox attack (Rebirthday Attack) that tries to match the DNS transaction ID in order to cache non-ECS poisonous replies.
A malicious actor can then exploit the Rebirthday Attack in two steps. First, send queries to Unbound that would result in segregated ECS outbound traffic from Unbound for a single domain. Second, send non-ECS poisonous replies to Unbound trying to guess the DNS transaction ID before the real answer from the upstream name server arrives.
Unbound version 1.23.1 includes a fix that disregards replies that came back without ECS when ECS was expected. Instead it creates a non-ECS sub query, that could be aggregated with other such queries, to explicitly query for the non-ECS authoritative answer. The re-introduced query aggregation then defeats the Rebirthday Attack.
Unbound 1.23.1 contains a patch. If you cannot upgrade you can also apply the patch manually. To do this, apply the patch on the Unbound source directory with patch -p1 < patch_CVE-2025-5994_2.diff and then run make install to install Unbound.
Unbounded name compression could lead to Denial of Service
| Date: | 2024-10-03 |
|---|---|
| CVE: | CVE-2024-8508 |
| Credit: | Toshifumi Sakaguchi |
| Affects: | Unbound up to and including version 1.21.0 |
| Not affected: | Other versions |
| Severity: | Medium |
| Impact: | Possibility of DoS in orchestrated attacks |
| Solution: | Download patched version of Unbound, or apply the patch manually |
Malicious upstreams responses with very large RRsets can cause Unbound to spend a considerable time applying name compression to downstream replies. This can lead to degraded performance and eventually denial of service in well orchestrated attacks.
The vulnerability can be exploited by a malicious actor querying Unbound for the specially crafted contents of a malicious zone with very large RRsets. Before Unbound replies to the query it will try to apply name compression which was an unbounded operation that could lock the CPU until the whole packet was complete.
Unbound version 1.21.1 introduces a hard limit on the number of name compression calculations it is willing to do per packet. Packets that need more compression will result in semi-compressed packets or truncated packets, even on TCP for huge messages, to avoid locking the CPU for long.
This change should not affect normal DNS traffic.
Unbound 1.21.1 contains a patch. If you cannot upgrade you can also apply the patch manually. To do this, apply the patch on the Unbound source directory with patch -p1 < patch_CVE-2024-8508.diff and then run make install to install Unbound.
Unbound vulnerable to the "DNSBomb" pulsing DoS amplification attack
| Date: | 2024-05-08 |
|---|---|
| CVE: | CVE-2024-33655 |
| Credit: | Xiang Li (Network and Information Security Lab, Tsinghua University) |
| Affects: | Unbound up to and including version 1.19.3 |
| Not affected: | Other versions |
| Severity: | Low |
| Impact: | Possibility of participation in the pulsing DoS amplification attack |
| Solution: | Download patched version of Unbound, or apply the patch manually |
The DNSBomb attack, via specially timed DNS queries and answers, can cause a Denial of Service on resolvers and spoofed targets.
Unbound itself is not vulnerable for DoS, rather it can be used to take part in a pulsing DoS amplification attack.
The DNSBomb attack works by sending low-rate spoofed queries for a malicious zone to Unbound. By controlling the delay of the malicious authoritative answers, Unbound slowly accumulates pending answers for the spoofed addresses. When the authoritative answers become available to Unbound at the same time, Unbound starts serving all the accumulated queries. This results into large-sized, concentrated response bursts to the spoofed addresses.
From version 1.20.0 on, Unbound introduces a couple of configuration options to help mitigate the impact. Their complete description can be found in the included manpages but they are also briefly listed here together with their current default values for convenience:
discard-timeout: 1900
After 1900 ms a reply to the client will be dropped. Unbound would still work on the query but refrain from replying in order to not accumulate a huge number of "old" replies. Legitimate clients retry on timeouts.
wait-limit: 1000 / wait-limit-cookie: 10000
Limits the amount of client queries that require recursion (cache-hits are not counted) per IP address. More recursive queries than the allowed limit are dropped. Clients with a valid EDNS Cookie can have a different limit, higher by default. wait-limit: 0 disables all wait limits.
wait-limit-netblock / wait-limit-cookie-netblock
These do not have a default value but they can fine grain configuration for specific netblocks. With or without EDNS Cookies.
The options above are trying to shrink the DNSBomb window so that the impact of the DoS from Unbound is significantly lower than it used to be and making the attack, and Unbound's participation, less tempting for attackers.
Unbound 1.20.0 contains a patch. If you cannot upgrade you can also apply the patch manually. To do this, apply the patch on the Unbound source directory with patch -p1 < patch_CVE-2024-33655.diff and then run make install to install Unbound.
Denial of service when trimming EDE text on positive replies
| Date: | 2024-03-07 |
|---|---|
| CVE: | CVE-2024-1931 |
| Credit: | Fredrik Pettai and Patrik Lundin from SUNET |
| Affects: | Unbound version 1.18.0 up to and including version 1.19.1 |
| Not affected: | Other versions, or 'ede: no' configurations |
| Severity: | High |
| Impact: | Denial of service when a vulnerable code path leads to an infinite loop |
| Solution: | Download patched version of Unbound, or use 'ede: no' (default), or apply the patch manually |
Unbound 1.18.0 introduced a feature that removes EDE records from responses with size higher than the client's advertised buffer size. Before removing all the EDE records however, it would try to see if trimming the extra text fields on those records would result in an acceptable size while still retaining the EDE codes. Due to an unchecked condition, the code that trims the text of the EDE records could loop indefinitely. This happens when Unbound would reply with attached EDE information on a positive reply and the client's buffer size is smaller than the needed space to include EDE records.
The vulnerability can only be triggered when the 'ede: yes' option is used; non default configuration.
From version 1.19.2 on, the code is fixed to avoid looping indefinitely.
Unbound 1.19.2 contains a patch. If you cannot upgrade you can also apply the patch manually. To do this, apply the patch on the Unbound source directory with patch -p1 < patch_CVE-2024-1931.diff and then run make install to install Unbound.
DNSSEC verification complexity can be exploited to exhaust CPU resources and stall DNS resolvers
| Date: | 2024-02-13 |
|---|---|
| CVE: | CVE-2023-50387 |
| Credit: | Elias Heftrig, Haya Schulmann, Niklas Vogel, and Michael Waidner from the German National Research Center for Applied Cybersecurity ATHENE |
| Affects: | Unbound up to and including version 1.19.0 |
| Not affected: | Other versions |
| Severity: | High |
| Impact: | DNSSEC validation can lead to DoS in trivially orchestrated attacks |
| Solution: | Download patched version of Unbound, or apply the patch manually |
A DNSSEC validation vulnerability has been discovered in various DNSSEC validating software. The vulnerability has an assigned number of CVE-2023-50387 and is referred here as the KeyTrap vulnerability.
The KeyTrap vulnerability works by using a combination of Keys (also colliding Keys), Signatures and number of RRSETs on a malicious zone. Answers from that zone can force a DNSSEC validator down a very CPU intensive and time costly validation path.
It can force Unbound to spend an enormous time (comparative to regular traffic) validating a single specially crafted DNSSEC response while everything else is on hold for that thread. A trivially orchestrated attack could render all threads busy with such responses leading to denial of service.
From version 1.19.1 on, Unbound introduces suspension on DNSSEC response validations that seem to require more attempts than Unbound is willing to make per response validation run. Suspension means that Unbound will continue with other work before resuming a suspended validation offering CPU time between validation resumptions to other tasks. There is a backoff timer when suspending which is further influenced by the number of suspends already used and the amount of work currently in Unbound.
The introduced builtin limits in Unbound are:
- Max 4 DNSSEC key collissions are allowed when building chain of trust. More than that without a secure key treats the delegation as bogus.
- 8 validation attempts per RRSET (combination of keys + signatures). If more are needed and Unbound has yet to find a valid signature the RRSET is treated as bogus.
- More than 8 validation attempts per answer will suspend validation.
- The limit of total suspensions is 16 after which the query will error out. Any completed RRSET validations populate the cache for use in future queries.
While under attack Unbound could show higher CPU load because of the needed validations but the suspend strategy would guarantee the CPU is not locked on any particular validation task.
Unbound 1.19.1 contains a patch. If you cannot upgrade you can also apply the patch manually. To do this, apply the patch on the Unbound source directory with patch -p1 < patch_CVE-2023-50387_CVE-2023-50868.diff and then run make install to install Unbound.
This is a shared patch with CVE-2023-50868 below
NSEC3 closest encloser proof can exhaust CPU
| Date: | 2024-02-13 |
|---|---|
| CVE: | CVE-2023-50868 |
| Credit: | Petr Špaček from ISC |
| Affects: | Unbound up to and including version 1.19.0 |
| Not affected: | Other versions |
| Severity: | High |
| Impact: | DNSSEC validation can lead to DoS in trivially orchestrated attacks |
| Solution: | Download patched version of Unbound, or apply the patch manually |
A DNSSEC validation vulnerability has been discovered in various DNSSEC validating software. The vulnerability has an assigned number of CVE-2023-50868 and is referred here as the NSEC3 vulnerability.
The NSEC3 vulnerability uses specially crafted responses on a malicious zone with multiple NSEC3 RRSETs to force a DNSSEC validator down a very CPU intensive and time costly NSEC3 hash calculation path.
It can force Unbound to spend an enormous time (comparative to regular traffic) validating a single specially crafted DNSSEC response while everything else is on hold for that thread. A trivially orchestrated attack could render all threads busy with such responses leading to denial of service.
From version 1.19.1 on, Unbound introduces suspension on DNSSEC response validations that seem to require more attempts than Unbound is willing to make per response validation run. Suspension means that Unbound will continue with other work before resuming a suspended validation offering CPU time between validation resumptions to other tasks. There is a backoff timer when suspending which is further influenced by the number of suspends already used and the amount of work currently in Unbound.
The introduced builtin limits for the NSEC3 vulnerability in Unbound are:
- 8 NSEC3 hash calculations are allowed before suspension. More than that will suspend validation.
- The limit of total suspensions is 16 after which the query will error out. Any completed RRSET validations populate the cache for use in future queries.
While under attack Unbound could show higher CPU load because of the needed validations but the suspend strategy would guarantee the CPU is not locked on any particular validation task.
Unbound 1.19.1 contains a patch. If you cannot upgrade you can also apply the patch manually. To do this, apply the patch on the Unbound source directory with patch -p1 < patch_CVE-2023-50387_CVE-2023-50868.diff and then run make install to install Unbound.
This is a shared patch with CVE-2023-50387 above
Non-Responsive Delegation Attack
| Date: | 2022-09-21 |
|---|---|
| CVE: | CVE-2022-3204 |
| Credit: | Yehuda Afek (Tel-Aviv University), Anat Bremler-Barr & Shani Stajnrod (Reichman University) |
| Affects: | Unbound up to and including version 1.16.2 |
| Not affected: | Other versions |
| Severity: | Medium |
| Impact: | Possibility of DoS in orchestrated attacks |
| Solution: | Download patched version of Unbound, or apply the patch manually |
A vulnerability named 'Non-Responsive Delegation Attack' (NRDelegation Attack) has been discovered in various DNS resolving software. The NRDelegation Attack works by having a malicious delegation with a considerable number of non responsive nameservers. The attack starts by querying a resolver for a record that relies on those unresponsive nameservers.
The attack can cause a resolver to spend a lot of time/resources resolving records under a malicious delegation point where a considerable number of unresponsive NS records reside. It can trigger high CPU usage in some resolver implementations that continually look in the cache for resolved NS records in that delegation. This can lead to degraded performance and eventually denial of service in orchestrated attacks.
Unbound does not suffer from high CPU usage, but resources are still needed for resolving the malicious delegation. Unbound will keep trying to resolve the record until hard limits are reached. Based on the nature of the attack and the replies, different limits could be reached.
From version 1.16.3 on, Unbound introduces fixes for better performance when under load, by cutting opportunistic queries for nameserver discovery and DNSKEY prefetching and limiting the number of times a delegation point can issue a cache lookup for missing records.
Unbound 1.16.3 contains a patch. If you cannot upgrade you can also apply the patch manually. To do this, apply the patch on the Unbound source directory with patch -p1 < patch_CVE-2022-3204.diff and then run make install to install Unbound.
Novel "ghost domain names" attack by updating almost expired delegation information
| Date: | 2022-08-01 |
|---|---|
| CVE: | CVE-2022-30699 |
| Credit: | Xiang Li (Network and Information Security Lab, Tsinghua University) |
| Affects: | Unbound up to and including version 1.16.1 |
| Not affected: | Other versions |
| Severity: | Medium |
| Impact: | Remote attackers can trigger continued resolvability of revoked domain names |
| Solution: | Download patched version of Unbound, or apply the patch manually |
NLnet Labs Unbound, up to and including version 1.16.1, is vulnerable to a novel type of the "ghost domain names" attack. The vulnerability works by targeting an Unbound instance. Unbound is queried for a rogue domain name when the cached delegation information is about to expire. The rogue nameserver delays the response so that the cached delegation information is expired. Upon receiving the delayed answer containing the delegation information, Unbound overwrites the now expired entries. This action can be repeated when the delegation information is about to expire making the rogue delegation information ever-updating. From version 1.16.2 on, Unbound stores the start time for a query and uses that to decide if the cached delegation information can be overwritten.
Unbound 1.16.2 contains a patch. If you cannot upgrade you can also apply the patch manually. To do this, apply the patch on the Unbound source directory with patch -p1 < patch_CVE-2022-30698_CVE-2022-30699.diff and then run make install to install Unbound.
This is a shared patch with CVE-2022-30698 below
Novel "ghost domain names" attack by introducing subdomain delegations
| Date: | 2022-08-01 |
|---|---|
| CVE: | CVE-2022-30698 |
| Credit: | Xiang Li (Network and Information Security Lab, Tsinghua University) |
| Affects: | Unbound up to and including version 1.16.1 |
| Not affected: | Other versions |
| Severity: | Medium |
| Impact: | Remote attackers can trigger continued resolvability of revoked domain names |
| Solution: | Download patched version of Unbound, or apply the patch manually |
NLnet Labs Unbound, up to and including version 1.16.1 is vulnerable to a novel type of the "ghost domain names" attack. The vulnerability works by targeting an Unbound instance. Unbound is queried for a subdomain of a rogue domain name. The rogue nameserver returns delegation information for the subdomain that updates Unbound's delegation cache. This action can be repeated before expiry of the delegation information by querying Unbound for a second level subdomain which the rogue nameserver provides new delegation information. Since Unbound is a child-centric resolver, the ever-updating child delegation information can keep a rogue domain name resolvable long after revocation. From version 1.16.2 on, Unbound checks the validity of parent delegation records before using cached delegation information.
Unbound 1.16.2 contains a patch. If you cannot upgrade you can also apply the patch manually. To do this, apply the patch on the Unbound source directory with patch -p1 < patch_CVE-2022-30698_CVE-2022-30699.diff and then run make install to install Unbound.
This is a shared patch with CVE-2022-30699 above
Local symlink attack
| Date: | 2020-12-01 |
|---|---|
| CVE: | CVE-2020-28935 |
| Credit: | Mason Loring Bliss |
| Affects: | Unbound up to and including version 1.12.0 |
| Not affected: | Other versions |
| Severity: | Low |
| Impact: | Denial of Service |
| Solution: | Download patched version of Unbound, or apply the patch manually |
Unbound when writing and later chown'ing the PID file would not check if an existing file was a symlink. This is a local vulnerability that could create a Denial of Service of the system Unbound is running on. It requires an attacker having access to the limited permission user Unbound runs as and point through the symlink to a critical file on the system.
Unbound 1.13.0 contains a patch. If you cannot upgrade you can also apply the patch manually. To do this, apply the patch on the Unbound source directory with patch -p1 < patch_cve-2020-28935_unbound.diff and then run make install to install Unbound.
Vulnerability in Domain Parse
| Date: | 2020-05-19 |
|---|---|
| CVE: | CVE-2020-12663 |
| Credit: | OSS-Fuzz project |
| Affects: | Unbound up to and including version 1.10.0 |
| Not affected: | Other versions |
| Severity: | Medium |
| Impact: | Unbound is unresponsive |
| Solution: | Download patched version of Unbound, or apply the patch manually |
Fuzzing of the Unbound code made us aware of issues in the parser of received answers. Malformed answers received from upstream servers can result in Unbound entering an infinite loop and thereby becoming unresponsive. When compiled with --enable-debug it is also possible to trigger an assertion, resulting in Unbound to crash.
Unbound 1.10.1 contains a patch. If you cannot upgrade you can also apply the patch manually. To do this, apply the patch on Unbound source directory with patch -p1 < filename, then run make install to install Unbound.
NXNSAttack
| Date: | 2020-05-19 |
|---|---|
| CVE: | CVE-2020-12662 |
| Credit: | Lior Shafir, Yehuda Afek, and Anat Bremler-Barr from Tel Aviv University |
| Affects: | Unbound up to and including version 1.10.0 |
| Not affected: | Other versions |
| Severity: | Medium |
| Impact: | Unbound performs amplification |
| Solution: | Download patched version of Unbound, or apply the patch manually |
Researchers from Tel Aviv University discovered an issue in Unbound and other DNS resolvers that makes it possible to have a single incoming query result in a large number of outgoing queries. This amplification makes it possible for Unbound to be used in a denial of service attack. The researchers discovering this called this attack the NXNSattack.
This attack makes use of cache bypassing using random subdomains in the NSDNAME in NS records. When these delegation records are received during iteration, and the answer does not contain glue records, a resolver has to send out a query to the get the IP address for one of the names. When this query fails (for example because the random name does not exist) a resolver will try the next one. A large set of NS records with random names can result in a large number of outgoing queries going to the same target. More details about this attack will be available in the research paper.
Unbound 1.10.1 contains a patch. If you cannot upgrade you can also apply the patch manually. To do this, apply the patch on Unbound source directory with patch -p1 < filename, then run make install to install Unbound.
Vulnerability in IPSEC module
| Date: | 2019-11-19 |
|---|---|
| CVE: | CVE-2019-18934 |
| Credit: | X41 D-Sec |
| Affects: | Unbound 1.6.4 up to and including version 1.9.4 |
| Not affected: | Other versions |
| Severity: | Critical |
| Impact: | Shell code execution after a specially crafted answer |
| Solution: | Download patched version of Unbound, or apply the patch manually |
Due to unsanitized characters passed to the ipsecmod-hook shell command, it is possible for Unbound to allow shell code execution from a specially crafted IPSECKEY answer.
This issue can only be triggered when all of the below conditions are met:
- unbound was compiled with --enable-ipsecmod support, and
- ipsecmod is enabled and used in the configuration (either in the configuration file or using unbound-control), and
- a domain is part of the ipsecmod-whitelist (if ipsecmod-whitelist is used), and
- unbound receives an A/AAAA query for a domain that has an A/AAAA record(s) and an IPSECKEY record(s) available.
The shell code execution can then happen if either the qname or the gateway field of the IPSECKEY (when gateway type == 3) contain a specially crafted domain name.
Unbound 1.9.5 contains a patch. If you cannot upgrade you can also apply the patch manually. To do this, apply the patch on Unbound source directory with patch -p1 < filename, then run make install to install Unbound.
Vulnerability in parsing NOTIFY queries
| Date: | 2019-10-03 |
|---|---|
| CVE: | CVE-2019-16866 |
| Credit: | X41 D-Sec |
| Affects: | Unbound 1.7.1 up to and including version 1.9.3 |
| Not affected: | Other versions |
| Severity: | Medium |
| Impact: | Crash after receiving a specially crafted query |
| Solution: | Download patched version of Unbound, or apply the patch manually |
Due to an error in parsing NOTIFY queries, it is possible for Unbound to continue processing malformed queries and may ultimately result in a pointer dereference in uninitialized memory. This results in a crash of the Unbound daemon.
Unbound 1.9.4 contains a patch. If you cannot upgrade you can also apply the patch manually. To do this, apply the patch on Unbound source directory with patch -p0 < filename, then run make install to install Unbound.
Vulnerability in the processing of wildcard synthesized NSEC records
| Date: | 2018-01-23 |
|---|---|
| CVE: | CVE-2017-15105 |
| Credit: | Ralph Dolmans (NLnet Labs), Karst Koymans (University of Amsterdam) |
| Affects: | Unbound 1.6.7 and earlier versions |
| Not affected: | Other versions |
| Severity: | Medium |
| Impact: | The wildcard NSEC record can be used to prove the non-existence (NXDOMAIN answer) of an existing wildcard record |
| Solution: | Download patched version of Unbound, or apply the patch manually |
We discovered a vulnerability in the processing of wildcard synthesized NSEC records. While synthesis of NSEC records is allowed by RFC4592, these synthesized owner names should not be used in the NSEC processing. This does, however, happen in Unbound 1.6.7 and earlier versions.
Unbound 1.6.8 contains a patch. If you cannot upgrade you can also apply the patch manually. To do this, apply the patch on Unbound source directory with patch -p0 < filename, then run make install to install Unbound.
A special thanks goes out to Karst Koymans (University of Amsterdam) for sparking the discovery of this vulnerability by Ralph Dolmans (NLnet Labs).
Ghost domain names attack
| Date: | 2012-02-17 |
|---|---|
| CVE: | CVE-2012-1192 |
| Credit: | ISC |
| Affects: | Unbound 1.4.11 and earlier versions |
| Not affected: | Other versions |
| Severity: | Medium |
| Impact: | Remote attackers can trigger continued resolvability of revoked domain names |
| Solution: | Upgrade to a newer version of Unbound |
The resolver in Unbound before 1.4.11 overwrites cached server names and TTL values in NS records during the processing of a response to an A record query, which allows remote attackers to trigger continued resolvability of revoked domain names via a "ghost domain names" attack. To resolve this issue, upgrade to a newer version of Unbound.
Incorrect proof processing for NSEC3-signed zone
| Date: | 2011-12-20 |
|---|---|
| CVE: | CVE-2011-4869 |
| Affects: | Unbound 1.4.13p2 and earlier versions |
| Not affected: | Other versions |
| Severity: | Medium |
| Impact: | Denial of service (daemon crash) |
| Exploit: | DNS servers can send a malformed response that lacks expected NSEC3 records |
| Solution: | Upgrade to a newer version of Unbound |
validator/val_nsec3.c in Unbound before 1.4.13p2 does not properly perform proof processing for NSEC3-signed zones, which allows remote DNS servers to cause a denial of service (daemon crash) via a malformed response that lacks expected NSEC3 records, a different vulnerability than CVE-2011-4528.
Unbound 1.4.14 contains a patch, but 1.4.14rc1 is vulnerable. If you cannot upgrade you can also apply a patch. For unbound version 1.4.0 - 1.4.13, apply this patch and for version 1.0.1 - 1.3.4 use this patch. To do this, apply the patch on Unbound source directory with patch -p0 < filename, then run make install to install Unbound.
Processing of duplicate CNAME records in a signed zone
| Date: | 2011-12-20 |
|---|---|
| CVE: | CVE-2011-4528 |
| Affects: | Unbound 1.4.13p2 and earlier versions |
| Not affected: | Other versions |
| Severity: | Medium |
| Impact: | Denial of service (daemon crash) |
| Exploit: | Remotely send a crafted response |
| Solution: | Upgrade to a newer version of Unbound |
Unbound crashes when confronted with a non-standard response from a server for a domain. This domain produces duplicate RRs from a certain type and is DNSSEC signed. Unbound also crashes when confronted with a query that eventually, and under specific circumstances, resolves to a domain that misses expected NSEC3 records.
Unbound 1.4.14 contains a patch, but 1.4.14rc1 is vulnerable. If you cannot upgrade you can also apply a patch. For unbound version 1.4.0 - 1.4.13, apply this patch and for version 1.0.1 - 1.3.4 use this patch. To do this, apply the patch on Unbound source directory with patch -p0 < filename, then run make install to install Unbound.