The DNS protocol in RFC 1035 and updates allows remote attackers to cause a denial of service (resource consumption) by arranging for DNS queries to be accumulated for seconds, such that responses are later sent in a pulsing burst (which can be considered traffic amplification in some cases), aka the "DNSBomb" issue.
{ "priority_reason": "Upstream Unbound project has rated this as having a low security impact.", "availability": "No subscription required", "binaries": [ { "binary_name": "libunbound-dev", "binary_version": "1.9.4-2ubuntu1.6" }, { "binary_name": "libunbound8", "binary_version": "1.9.4-2ubuntu1.6" }, { "binary_name": "libunbound8-dbgsym", "binary_version": "1.9.4-2ubuntu1.6" }, { "binary_name": "python-unbound", "binary_version": "1.9.4-2ubuntu1.6" }, { "binary_name": "python-unbound-dbgsym", "binary_version": "1.9.4-2ubuntu1.6" }, { "binary_name": "python3-unbound", "binary_version": "1.9.4-2ubuntu1.6" }, { "binary_name": "python3-unbound-dbgsym", "binary_version": "1.9.4-2ubuntu1.6" }, { "binary_name": "unbound", "binary_version": "1.9.4-2ubuntu1.6" }, { "binary_name": "unbound-anchor", "binary_version": "1.9.4-2ubuntu1.6" }, { "binary_name": "unbound-anchor-dbgsym", "binary_version": "1.9.4-2ubuntu1.6" }, { "binary_name": "unbound-dbgsym", "binary_version": "1.9.4-2ubuntu1.6" }, { "binary_name": "unbound-host", "binary_version": "1.9.4-2ubuntu1.6" }, { "binary_name": "unbound-host-dbgsym", "binary_version": "1.9.4-2ubuntu1.6" } ] }
{ "priority_reason": "Upstream Unbound project has rated this as having a low security impact.", "availability": "No subscription required", "binaries": [ { "binary_name": "libunbound-dev", "binary_version": "1.13.1-1ubuntu5.5" }, { "binary_name": "libunbound8", "binary_version": "1.13.1-1ubuntu5.5" }, { "binary_name": "libunbound8-dbgsym", "binary_version": "1.13.1-1ubuntu5.5" }, { "binary_name": "python3-unbound", "binary_version": "1.13.1-1ubuntu5.5" }, { "binary_name": "python3-unbound-dbgsym", "binary_version": "1.13.1-1ubuntu5.5" }, { "binary_name": "unbound", "binary_version": "1.13.1-1ubuntu5.5" }, { "binary_name": "unbound-anchor", "binary_version": "1.13.1-1ubuntu5.5" }, { "binary_name": "unbound-anchor-dbgsym", "binary_version": "1.13.1-1ubuntu5.5" }, { "binary_name": "unbound-dbgsym", "binary_version": "1.13.1-1ubuntu5.5" }, { "binary_name": "unbound-host", "binary_version": "1.13.1-1ubuntu5.5" }, { "binary_name": "unbound-host-dbgsym", "binary_version": "1.13.1-1ubuntu5.5" } ] }
{ "priority_reason": "Upstream Unbound project has rated this as having a low security impact.", "availability": "No subscription required", "binaries": [ { "binary_name": "libunbound-dev", "binary_version": "1.19.2-1ubuntu3.1" }, { "binary_name": "libunbound8", "binary_version": "1.19.2-1ubuntu3.1" }, { "binary_name": "libunbound8-dbgsym", "binary_version": "1.19.2-1ubuntu3.1" }, { "binary_name": "python3-unbound", "binary_version": "1.19.2-1ubuntu3.1" }, { "binary_name": "python3-unbound-dbgsym", "binary_version": "1.19.2-1ubuntu3.1" }, { "binary_name": "unbound", "binary_version": "1.19.2-1ubuntu3.1" }, { "binary_name": "unbound-anchor", "binary_version": "1.19.2-1ubuntu3.1" }, { "binary_name": "unbound-anchor-dbgsym", "binary_version": "1.19.2-1ubuntu3.1" }, { "binary_name": "unbound-dbgsym", "binary_version": "1.19.2-1ubuntu3.1" }, { "binary_name": "unbound-host", "binary_version": "1.19.2-1ubuntu3.1" }, { "binary_name": "unbound-host-dbgsym", "binary_version": "1.19.2-1ubuntu3.1" } ] }