fcb33424c5
jakob@ and myself. See http://www.unbound.net/downloads/CVE-2011-4528.txt for more details, summary from the above is below: -- Unbound crashes when confronted with a non-standard response from a server for a domain. This domain produces duplicate RRs from a certain type and is DNSSEC signed.Unbound also crashes when confronted with a query that eventually, and under specific circumstances, resolves to a domain that misses expected NSEC3 records. These two problems were discovered within 24 hours, hence a combined vulnerability disclosure. By constructing the non standard responses an attacker can use these vulnerabilities for a DOS attack. To our knowledge 'denial of service' is the only type of exploit possible. --
13 lines
532 B
Plaintext
13 lines
532 B
Plaintext
$OpenBSD: patch-doc_example_conf_in,v 1.9 2011/12/20 10:49:19 sthen Exp $
|
|
--- doc/example.conf.in.orig Tue Dec 13 03:58:23 2011
|
|
+++ doc/example.conf.in Tue Dec 13 07:37:15 2011
|
|
@@ -191,7 +191,7 @@ server:
|
|
# chroot: "@UNBOUND_CHROOT_DIR@"
|
|
|
|
# if given, user privileges are dropped (after binding port),
|
|
- # and the given username is assumed. Default is user "unbound".
|
|
+ # and the given username is assumed. Default is user "@UNBOUND_USERNAME@".
|
|
# If you give "" no privileges are dropped.
|
|
# username: "@UNBOUND_USERNAME@"
|
|
|