Upstream information

CVE-2022-30698 at MITRE

Description

NLnet Labs Unbound, up to and including version 1.16.1 is vulnerable to a novel type of the "ghost domain names" attack. The vulnerability works by targeting an Unbound instance. Unbound is queried for a subdomain of a rogue domain name. The rogue nameserver returns delegation information for the subdomain that updates Unbound's delegation cache. This action can be repeated before expiry of the delegation information by querying Unbound for a second level subdomain which the rogue nameserver provides new delegation information. Since Unbound is a child-centric resolver, the ever-updating child delegation information can keep a rogue domain name resolvable long after revocation. From version 1.16.2 on, Unbound checks the validity of parent delegation records before using cached delegation information.

SUSE information

Overall state of this security issue: Pending

This issue is currently rated as having moderate severity.

CVSS v3 Scores
  National Vulnerability Database SUSE
Base Score 6.5 5.6
Vector CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
Attack Vector Network Network
Attack Complexity Low High
Privileges Required Low None
User Interaction None None
Scope Unchanged Unchanged
Confidentiality Impact High Low
Integrity Impact None Low
Availability Impact None Low
CVSSv3 Version 3.1 3.1
SUSE Bugzilla entries: 1202031 [NEW], 1202033 [NEW]

No SUSE Security Announcements cross referenced.

List of released packages

Product(s) Fixed package version(s) References
openSUSE Tumbleweed
  • libunbound8 >= 1.16.2-1.1
  • python3-unbound >= 1.16.2-1.1
  • unbound >= 1.16.2-1.1
  • unbound-anchor >= 1.16.2-1.1
  • unbound-devel >= 1.16.2-1.1
  • unbound-munin >= 1.16.2-1.1
Patchnames:
openSUSE Tumbleweed GA libunbound8-1.16.2-1.1


Status of this issue by product and package

Please note that this evaluation state might be work in progress, incomplete or outdated. Also information for service packs in the LTSS phase is only included for issues meeting the LTSS criteria. If in doubt, feel free to contact us for clarification.

Product(s) Source package State
SUSE CaaS Platform 4.0 unbound Affected
SUSE Enterprise Storage 6 unbound Affected
SUSE Enterprise Storage 7 unbound Affected
SUSE Enterprise Storage 7.1 unbound Affected
SUSE Linux Enterprise Desktop 15 unbound Won't fix
SUSE Linux Enterprise Desktop 15 SP1 unbound Affected
SUSE Linux Enterprise Desktop 15 SP2 unbound Affected
SUSE Linux Enterprise Desktop 15 SP3 unbound Affected
SUSE Linux Enterprise Desktop 15 SP4 unbound Affected
SUSE Linux Enterprise High Performance Computing 15 unbound Won't fix
SUSE Linux Enterprise High Performance Computing 15 SP1 unbound Affected
SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS unbound Affected
SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS unbound Affected
SUSE Linux Enterprise High Performance Computing 15 SP2 unbound Affected
SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS unbound Affected
SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS unbound Affected
SUSE Linux Enterprise High Performance Computing 15 SP3 unbound Affected
SUSE Linux Enterprise High Performance Computing 15 SP4 unbound Affected
SUSE Linux Enterprise High Performance Computing 15-ESPOS unbound Won't fix
SUSE Linux Enterprise High Performance Computing 15-LTSS unbound Won't fix
SUSE Linux Enterprise Module for Basesystem 15 unbound Won't fix
SUSE Linux Enterprise Module for Basesystem 15 SP1 unbound Affected
SUSE Linux Enterprise Module for Basesystem 15 SP2 unbound Affected
SUSE Linux Enterprise Module for Basesystem 15 SP3 unbound Affected
SUSE Linux Enterprise Module for Basesystem 15 SP4 unbound Affected
SUSE Linux Enterprise Module for Package Hub 15 SP3 unbound Affected
SUSE Linux Enterprise Module for Package Hub 15 SP4 unbound Affected
SUSE Linux Enterprise Real Time 15 SP2 unbound Affected
SUSE Linux Enterprise Real Time 15 SP3 unbound Affected
SUSE Linux Enterprise Server 15 unbound Won't fix
SUSE Linux Enterprise Server 15 SP1 unbound Affected
SUSE Linux Enterprise Server 15 SP1-BCL unbound Affected
SUSE Linux Enterprise Server 15 SP1-LTSS unbound Affected
SUSE Linux Enterprise Server 15 SP2 unbound Affected
SUSE Linux Enterprise Server 15 SP2-BCL unbound Affected
SUSE Linux Enterprise Server 15 SP2-LTSS unbound Affected
SUSE Linux Enterprise Server 15 SP3 unbound Affected
SUSE Linux Enterprise Server 15 SP4 unbound Affected
SUSE Linux Enterprise Server 15-ESPOS unbound Won't fix
SUSE Linux Enterprise Server 15-LTSS unbound Won't fix
SUSE Linux Enterprise Server Business Critical Linux 15 SP1 unbound Affected
SUSE Linux Enterprise Server Business Critical Linux 15 SP2 unbound Affected
SUSE Linux Enterprise Server for SAP Applications 15 unbound Won't fix
SUSE Linux Enterprise Server for SAP Applications 15 SP1 unbound Affected
SUSE Linux Enterprise Server for SAP Applications 15 SP2 unbound Affected
SUSE Linux Enterprise Server for SAP Applications 15 SP3 unbound Affected
SUSE Linux Enterprise Server for SAP Applications 15 SP4 unbound Affected
SUSE Manager Proxy 4.0 unbound Affected
SUSE Manager Proxy 4.1 unbound Affected
SUSE Manager Proxy 4.2 unbound Affected
SUSE Manager Proxy 4.3 unbound Affected
SUSE Manager Retail Branch Server 4.0 unbound Affected
SUSE Manager Retail Branch Server 4.1 unbound Affected
SUSE Manager Retail Branch Server 4.2 unbound Affected
SUSE Manager Retail Branch Server 4.3 unbound Affected
SUSE Manager Server 4.0 unbound Affected
SUSE Manager Server 4.1 unbound Affected
SUSE Manager Server 4.2 unbound Affected
SUSE Manager Server 4.3 unbound Affected
SUSE Package Hub 15 SP3 unbound Affected
SUSE Package Hub 15 SP4 unbound Affected


SUSE Timeline for this CVE

CVE page created: Mon Aug 1 16:23:45 2022
CVE page last modified: Thu Dec 1 00:36:31 2022