Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2018.0218 A vulnerability has been identified in unbound 22 January 2018 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: unbound Publisher: FreeBSD Operating System: FreeBSD UNIX variants (UNIX, Linux, OSX) Windows Impact/Access: Denial of Service -- Remote/Unauthenticated Provide Misleading Information -- Remote/Unauthenticated Resolution: Patch/Upgrade CVE Names: CVE-2017-15105 Original Bulletin: http://www.vuxml.org/freebsd/8d3bae09-fd28-11e7-95f2-005056925db4.html Comment: This advisory references vulnerabilities in products which run on platforms other than FreeBSD. It is recommended that administrators running unbound check for an updated version of the software for their operating system. - --------------------------BEGIN INCLUDED TEXT-------------------- unbound -- vulnerability in the processing of wildcard synthesized NSEC records Affected packages unbound < 1.6.8 Details VuXML ID 8d3bae09-fd28-11e7-95f2-005056925db4 Discovery 2017-10-08 Entry 2018-01-19 Unbound reports: We discovered a vulnerability in the processing of wildcard synthesized NSEC records. While synthesis of NSEC records is allowed by RFC4592, these synthesized owner names should not be used in the NSEC processing. This does, however, happen in Unbound 1.6.7 and earlier versions. References CVE Name CVE-2017-15105 FreeBSD PR ports/225313 URL https://unbound.net/downloads/CVE-2017-15105.txt - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBWmU+1Yx+lLeg9Ub1AQhiEg/9FDA9JGWtCPp735EZpS84fU7O3ccgg8T2 FLydp5wKCihbrp96iL1sQQzAq9PRfrm5BeX/eWwtxxg6qBt1SEzkY16uuQM/zHxv xvxNOcIdF6EQl+2Qy6CepTKf53nEoOtQnkGPq1a5RWHzvHuw/6ZlT3oEGS+wCM7k sag8GWJO8C4YStIBRSwNfOF4a1dBQENPTC4reknRIs7+STwy+tr68BcjsJn0qngt PdShCaasSbbq3Yx/VKuxjsn9Dfu/xXNrfpbuuc3w3ISwA5r6wTgZuxBf/YYi8Qgm KREoUMwqbHJvxP1bfq0zsVWOzLSE1443l4TAtFDQMW5uCgZfXFX9Ja7Tol/zXbsA tOD2nJQ75WRvH4wIotv4/W5CzKlH6b3f/Et9+Bl+5dr08OFQq/jVQtLNjfa/U2fo yT6Eva7EoNwSXQ7TeWun3oTCQ7sOf5V81EiDxTCR0yUIT1E1SJF2z1b2VeFK2Uhy U+JW5q77K4ZZc4PWtfO6yFXKxSKPb5hkn2htltdszNb8kSm/uwtRoHsXvt5tw5H6 mXEWHFc+SCyPtI0AeLe3IlrWPhZSotev4i5O0Sv39AJ2T96jNTmBDWPbyAmo/Ydn LEvOZMHc2hRnZZxzMmCAkEHjrU9puzOTUo0JTmgY0KoIfYSC8Il+ibjDtRFnUi1j C/jWF8cwpOc= =kEl8 -----END PGP SIGNATURE-----