Unbound before 1.9.4 accesses uninitialized memory, which allows remote attackers to trigger a crash via a crafted NOTIFY query. The source IP address of the query must match an access-control rule.
The product does not handle or incorrectly handles an exceptional condition.
Link | Tags |
---|---|
https://github.com/NLnetLabs/unbound/blob/release-1.9.4/doc/Changelog | release notes product |
https://nlnetlabs.nl/downloads/unbound/CVE-2019-16866.txt | patch vendor advisory |
https://usn.ubuntu.com/4149-1/ | third party advisory vendor advisory |
https://www.debian.org/security/2019/dsa-4544 | vendor advisory |
https://seclists.org/bugtraq/2019/Oct/23 | mailing list |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E65NCWZZB2D75ZIYWPXKMVGSGNYW4JMC/ | vendor advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MLRHE7TQFAOV4MB2ELTOGESZYUL65NUJ/ | vendor advisory |