openbsd-ports/net/unbound/patches/patch-doc_example_conf_in
sthen fcb33424c5 SECURITY update to Unbound 1.4.14, incorporating various diffs from Brad,
jakob@ and myself. See http://www.unbound.net/downloads/CVE-2011-4528.txt
for more details, summary from the above is below:

--
Unbound crashes when confronted with a non-standard response from a
server for a domain. This domain produces duplicate RRs from a certain
type and is DNSSEC signed.Unbound also crashes when confronted with a
query that eventually, and under specific circumstances, resolves to a
domain that misses expected NSEC3 records.

These two problems were discovered within 24 hours, hence a combined
vulnerability disclosure.

By constructing the non standard responses an attacker can use these
vulnerabilities for a DOS attack.

To our knowledge 'denial of service' is the only type of exploit possible.
--
2011-12-20 10:49:19 +00:00

13 lines
532 B
Plaintext

$OpenBSD: patch-doc_example_conf_in,v 1.9 2011/12/20 10:49:19 sthen Exp $
--- doc/example.conf.in.orig Tue Dec 13 03:58:23 2011
+++ doc/example.conf.in Tue Dec 13 07:37:15 2011
@@ -191,7 +191,7 @@ server:
# chroot: "@UNBOUND_CHROOT_DIR@"
# if given, user privileges are dropped (after binding port),
- # and the given username is assumed. Default is user "unbound".
+ # and the given username is assumed. Default is user "@UNBOUND_USERNAME@".
# If you give "" no privileges are dropped.
# username: "@UNBOUND_USERNAME@"