Open mend-for-github-com[bot] opened 2 years ago
:heavy_check_mark: This issue was automatically closed by Mend because the vulnerable library in the specific branch(es) was either marked as ignored or it is no longer part of the Mend inventory.
:information_source: This issue was automatically re-opened by Mend because the vulnerable library in the specific branch(es) has been detected in the Mend inventory.
CVE-2017-15105 - Medium Severity Vulnerability
Vulnerable Library - src0aecda14650f9fce8577e43d2a403385b5fa5bcf
Public git conversion mirror of OpenBSD's official CVS src repository. Pull requests not accepted - send diffs to the tech@ mailing list.
Library home page: https://github.com/openbsd/src.git
Vulnerable Source Files (19)
/usr.sbin/unbound/validator/val_sigcrypt.h /sbin/unwind/libunbound/validator/val_nsec3.c /sbin/unwind/libunbound/validator/val_utils.c /usr.sbin/unbound/validator/val_nsec3.h /usr.sbin/unbound/testcode/unitverify.c /sbin/unwind/libunbound/validator/val_nsec.c /usr.sbin/unbound/validator/val_sigcrypt.c /sbin/unwind/libunbound/validator/val_nsec.h /sbin/unwind/libunbound/validator/autotrust.c /sbin/unwind/libunbound/validator/val_nsec.h /sbin/unwind/libunbound/validator/autotrust.c /usr.sbin/unbound/validator/val_utils.h /sbin/unwind/libunbound/validator/val_nsec.c /usr.sbin/unbound/validator/val_utils.h /sbin/unwind/libunbound/validator/val_utils.c /usr.sbin/unbound/validator/val_nsec3.h /sbin/unwind/libunbound/validator/val_nsec3.c /usr.sbin/unbound/validator/autotrust.h /usr.sbin/unbound/testcode/unitverify.c
Vulnerability Details
A flaw was found in the way unbound before 1.6.8 validated wildcard-synthesized NSEC records. An improperly validated wildcard NSEC record could be used to prove the non-existence (NXDOMAIN answer) of an existing wildcard record, or trick unbound into accepting a NODATA proof.
Publish Date: 2018-01-23
URL: CVE-2017-15105
CVSS 3 Score Details (5.3)
Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: Low - Availability Impact: None
For more information on CVSS3 Scores, click here.Suggested Fix
Type: Upgrade version
Origin: https://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-15105.html?_ga=2.64476783.1378616279.1557906819-1323961674.1551865132
Release Date: 2018-01-23
Fix Resolution: release-1.7.0rc1