Bug 2303462 (CVE-2024-43168)

Summary: CVE-2024-43168 unbound: Heap-Buffer-Overflow in Unbound
Product: [Other] Security Response Reporter: Abhishek Raj <abhraj>
Component: vulnerabilityAssignee: Product Security DevOps Team <prodsec-dev>
Status: NEW --- QA Contact:
Severity: low Docs Contact:
Priority: low    
Version: unspecifiedCC: bdettelb, doconnor, eglynn, jjoyce, jschluet, lhh, lsvaty, mburns, mgarciac, pemensik, pgrist, teagle
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
A heap-buffer-overflow flaw was found in the cfg_mark_ports function within Unbound's config_file.c, which can lead to memory corruption. This issue could allow an attacker with local access to provide specially crafted input, potentially causing the application to crash or allowing arbitrary code execution. This could result in a denial of service or unauthorized actions on the system.
Story Points: ---
Clone Of: Environment:
Last Closed: Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2303471, 2303472, 2303473, 2303474    
Bug Blocks:    

Description Abhishek Raj 2024-08-07 14:06:29 UTC
Unbound version <= 1.19.3 contains a heap-buffer-overflow vulnerability. The flaw occurs in the cfg_mark_ports function within the config_file.c file, leading to potential memory corruption. This issue can be triggered when processing certain inputs, causing the application to crash or potentially allowing an attacker to execute arbitrary code.