Open mend-for-github-com[bot] opened 2 years ago
:heavy_check_mark: This issue was automatically closed by Mend because the vulnerable library in the specific branch(es) was either marked as ignored or it is no longer part of the Mend inventory.
:information_source: This issue was automatically re-opened by Mend because the vulnerable library in the specific branch(es) has been detected in the Mend inventory.
CVE-2019-18934 - High Severity Vulnerability
Vulnerable Library - src0aecda14650f9fce8577e43d2a403385b5fa5bcf
Public git conversion mirror of OpenBSD's official CVS src repository. Pull requests not accepted - send diffs to the tech@ mailing list.
Library home page: https://github.com/openbsd/src.git
Vulnerable Source Files (2)
/usr.sbin/unbound/ipsecmod/ipsecmod.c /usr.sbin/unbound/ipsecmod/ipsecmod.c
Vulnerability Details
Unbound 1.6.4 through 1.9.4 contain a vulnerability in the ipsec module that can cause shell code execution after receiving a specially crafted answer. This issue can only be triggered if unbound was compiled with `--enable-ipsecmod` support, and ipsecmod is enabled and used in the configuration.
Publish Date: 2019-11-19
URL: CVE-2019-18934
CVSS 3 Score Details (7.3)
Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: Low
For more information on CVSS3 Scores, click here.Suggested Fix
Type: Upgrade version
Origin: https://www.nlnetlabs.nl/news/2019/Nov/19/unbound-1.9.5-released/
Release Date: 2019-11-19
Fix Resolution: 1.9.5