The DNS protocol in RFC 1035 and updates allows remote attackers to cause a denial of service (resource consumption) by arranging for DNS queries to be accumulated for seconds, such that responses are later sent in a pulsing burst (which can be considered traffic amplification in some cases), aka the "DNSBomb" issue.
{ "availability": "No subscription required", "priority_reason": "Upstream Unbound project has rated this as having a low security impact.", "binaries": [ { "binary_version": "1.9.4-2ubuntu1.6", "binary_name": "libunbound-dev" }, { "binary_version": "1.9.4-2ubuntu1.6", "binary_name": "libunbound8" }, { "binary_version": "1.9.4-2ubuntu1.6", "binary_name": "python-unbound" }, { "binary_version": "1.9.4-2ubuntu1.6", "binary_name": "python3-unbound" }, { "binary_version": "1.9.4-2ubuntu1.6", "binary_name": "unbound" }, { "binary_version": "1.9.4-2ubuntu1.6", "binary_name": "unbound-anchor" }, { "binary_version": "1.9.4-2ubuntu1.6", "binary_name": "unbound-host" } ] }
{ "availability": "No subscription required", "priority_reason": "Upstream Unbound project has rated this as having a low security impact.", "binaries": [ { "binary_version": "1.13.1-1ubuntu5.5", "binary_name": "libunbound-dev" }, { "binary_version": "1.13.1-1ubuntu5.5", "binary_name": "libunbound8" }, { "binary_version": "1.13.1-1ubuntu5.5", "binary_name": "python3-unbound" }, { "binary_version": "1.13.1-1ubuntu5.5", "binary_name": "unbound" }, { "binary_version": "1.13.1-1ubuntu5.5", "binary_name": "unbound-anchor" }, { "binary_version": "1.13.1-1ubuntu5.5", "binary_name": "unbound-host" } ] }
{ "availability": "No subscription required", "priority_reason": "Upstream Unbound project has rated this as having a low security impact.", "binaries": [ { "binary_version": "1.19.2-1ubuntu3.1", "binary_name": "libunbound-dev" }, { "binary_version": "1.19.2-1ubuntu3.1", "binary_name": "libunbound8" }, { "binary_version": "1.19.2-1ubuntu3.1", "binary_name": "python3-unbound" }, { "binary_version": "1.19.2-1ubuntu3.1", "binary_name": "unbound" }, { "binary_version": "1.19.2-1ubuntu3.1", "binary_name": "unbound-anchor" }, { "binary_version": "1.19.2-1ubuntu3.1", "binary_name": "unbound-host" } ] }
{ "priority_reason": "Upstream Unbound project has rated this as having a low security impact.", "binaries": [ { "binary_version": "1.4.22-1ubuntu4.14.04.3+esm2", "binary_name": "libunbound-dev" }, { "binary_version": "1.4.22-1ubuntu4.14.04.3+esm2", "binary_name": "libunbound2" }, { "binary_version": "1.4.22-1ubuntu4.14.04.3+esm2", "binary_name": "python-unbound" }, { "binary_version": "1.4.22-1ubuntu4.14.04.3+esm2", "binary_name": "unbound" }, { "binary_version": "1.4.22-1ubuntu4.14.04.3+esm2", "binary_name": "unbound-anchor" }, { "binary_version": "1.4.22-1ubuntu4.14.04.3+esm2", "binary_name": "unbound-host" } ] }
{ "priority_reason": "Upstream Unbound project has rated this as having a low security impact.", "binaries": [ { "binary_version": "1.5.8-1ubuntu1.1+esm2", "binary_name": "libunbound-dev" }, { "binary_version": "1.5.8-1ubuntu1.1+esm2", "binary_name": "libunbound2" }, { "binary_version": "1.5.8-1ubuntu1.1+esm2", "binary_name": "python-unbound" }, { "binary_version": "1.5.8-1ubuntu1.1+esm2", "binary_name": "unbound" }, { "binary_version": "1.5.8-1ubuntu1.1+esm2", "binary_name": "unbound-anchor" }, { "binary_version": "1.5.8-1ubuntu1.1+esm2", "binary_name": "unbound-host" } ] }
{ "priority_reason": "Upstream Unbound project has rated this as having a low security impact.", "binaries": [ { "binary_version": "1.6.7-1ubuntu2.6+esm3", "binary_name": "libunbound-dev" }, { "binary_version": "1.6.7-1ubuntu2.6+esm3", "binary_name": "libunbound2" }, { "binary_version": "1.6.7-1ubuntu2.6+esm3", "binary_name": "python-unbound" }, { "binary_version": "1.6.7-1ubuntu2.6+esm3", "binary_name": "python3-unbound" }, { "binary_version": "1.6.7-1ubuntu2.6+esm3", "binary_name": "unbound" }, { "binary_version": "1.6.7-1ubuntu2.6+esm3", "binary_name": "unbound-anchor" }, { "binary_version": "1.6.7-1ubuntu2.6+esm3", "binary_name": "unbound-host" } ] }