The DNS protocol in RFC 1035 and updates allows remote attackers to cause a denial of service (resource consumption) by arranging for DNS queries to be accumulated for seconds, such that responses are later sent in a pulsing burst (which can be considered traffic amplification in some cases), aka the "DNSBomb" issue.
{
"priority_reason": "Upstream Unbound project has rated this as having a low security impact.",
"availability": "No subscription required",
"binaries": [
{
"binary_name": "libunbound-dev",
"binary_version": "1.9.4-2ubuntu1.6"
},
{
"binary_name": "libunbound8",
"binary_version": "1.9.4-2ubuntu1.6"
},
{
"binary_name": "python-unbound",
"binary_version": "1.9.4-2ubuntu1.6"
},
{
"binary_name": "python3-unbound",
"binary_version": "1.9.4-2ubuntu1.6"
},
{
"binary_name": "unbound",
"binary_version": "1.9.4-2ubuntu1.6"
},
{
"binary_name": "unbound-anchor",
"binary_version": "1.9.4-2ubuntu1.6"
},
{
"binary_name": "unbound-host",
"binary_version": "1.9.4-2ubuntu1.6"
}
]
}{
"priority_reason": "Upstream Unbound project has rated this as having a low security impact.",
"availability": "No subscription required",
"binaries": [
{
"binary_name": "libunbound-dev",
"binary_version": "1.13.1-1ubuntu5.5"
},
{
"binary_name": "libunbound8",
"binary_version": "1.13.1-1ubuntu5.5"
},
{
"binary_name": "python3-unbound",
"binary_version": "1.13.1-1ubuntu5.5"
},
{
"binary_name": "unbound",
"binary_version": "1.13.1-1ubuntu5.5"
},
{
"binary_name": "unbound-anchor",
"binary_version": "1.13.1-1ubuntu5.5"
},
{
"binary_name": "unbound-host",
"binary_version": "1.13.1-1ubuntu5.5"
}
]
}{
"priority_reason": "Upstream Unbound project has rated this as having a low security impact.",
"availability": "No subscription required",
"binaries": [
{
"binary_name": "libunbound-dev",
"binary_version": "1.19.2-1ubuntu3.1"
},
{
"binary_name": "libunbound8",
"binary_version": "1.19.2-1ubuntu3.1"
},
{
"binary_name": "python3-unbound",
"binary_version": "1.19.2-1ubuntu3.1"
},
{
"binary_name": "unbound",
"binary_version": "1.19.2-1ubuntu3.1"
},
{
"binary_name": "unbound-anchor",
"binary_version": "1.19.2-1ubuntu3.1"
},
{
"binary_name": "unbound-host",
"binary_version": "1.19.2-1ubuntu3.1"
}
]
}{
"priority_reason": "Upstream Unbound project has rated this as having a low security impact.",
"binaries": [
{
"binary_name": "libunbound-dev",
"binary_version": "1.4.22-1ubuntu4.14.04.3+esm2"
},
{
"binary_name": "libunbound2",
"binary_version": "1.4.22-1ubuntu4.14.04.3+esm2"
},
{
"binary_name": "python-unbound",
"binary_version": "1.4.22-1ubuntu4.14.04.3+esm2"
},
{
"binary_name": "unbound",
"binary_version": "1.4.22-1ubuntu4.14.04.3+esm2"
},
{
"binary_name": "unbound-anchor",
"binary_version": "1.4.22-1ubuntu4.14.04.3+esm2"
},
{
"binary_name": "unbound-host",
"binary_version": "1.4.22-1ubuntu4.14.04.3+esm2"
}
]
}{
"priority_reason": "Upstream Unbound project has rated this as having a low security impact.",
"binaries": [
{
"binary_name": "libunbound-dev",
"binary_version": "1.5.8-1ubuntu1.1+esm2"
},
{
"binary_name": "libunbound2",
"binary_version": "1.5.8-1ubuntu1.1+esm2"
},
{
"binary_name": "python-unbound",
"binary_version": "1.5.8-1ubuntu1.1+esm2"
},
{
"binary_name": "unbound",
"binary_version": "1.5.8-1ubuntu1.1+esm2"
},
{
"binary_name": "unbound-anchor",
"binary_version": "1.5.8-1ubuntu1.1+esm2"
},
{
"binary_name": "unbound-host",
"binary_version": "1.5.8-1ubuntu1.1+esm2"
}
]
}{
"priority_reason": "Upstream Unbound project has rated this as having a low security impact.",
"binaries": [
{
"binary_name": "libunbound-dev",
"binary_version": "1.6.7-1ubuntu2.6+esm3"
},
{
"binary_name": "libunbound2",
"binary_version": "1.6.7-1ubuntu2.6+esm3"
},
{
"binary_name": "python-unbound",
"binary_version": "1.6.7-1ubuntu2.6+esm3"
},
{
"binary_name": "python3-unbound",
"binary_version": "1.6.7-1ubuntu2.6+esm3"
},
{
"binary_name": "unbound",
"binary_version": "1.6.7-1ubuntu2.6+esm3"
},
{
"binary_name": "unbound-anchor",
"binary_version": "1.6.7-1ubuntu2.6+esm3"
},
{
"binary_name": "unbound-host",
"binary_version": "1.6.7-1ubuntu2.6+esm3"
}
]
}