Impact
Unbound versions 1.14.0 through 1.25.0 incorrectly calculate the size of EDNS options, allowing a crafted packet that contains multiple NSID, DNS Cookie, or EDNS Padding options to overflow the heap when encoded. This overflow writes Unbound‑controlled data and results in a crash of the server. The flaw does not provide code execution but can be used repeatedly to disrupt service availability for any client that can reach the resolver.
Affected Systems
The vulnerability affects NLnet Labs Unbound DNS resolver. All releases between 1.14.0 and 1.25.0, inclusive, are impacted. The issue is fixed in Unbound 1.25.1 and later releases.
Risk and Exploitability
The CVSS score of 8.7 indicates a high severity. With no EPSS score reported and not listed in the CISA KEV catalog, exploitation is possible but the lack of published exploits means the attack surface depends on an attacker’s ability to send specially crafted queries. An attacker can target the resolver over the network and trigger the overflow by sending queries that enable the vulnerable EDNS options. The impact is a denial of service, and the vulnerability is exploitable remotely without authentication.
OpenCVE Enrichment
Ubuntu USN