Bug 2380949 (CVE-2025-5994) - CVE-2025-5994 unbound: Unbound Cache poisoning
Summary: CVE-2025-5994 unbound: Unbound Cache poisoning
Keywords:
Status: NEW
Alias: CVE-2025-5994
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On: 2381425 2381426
Blocks:
TreeView+ depends on / blocked
 
Reported: 2025-07-16 15:02 UTC by OSIDB Bzimport
Modified: 2025-07-16 18:19 UTC (History)
0 users

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2025-07-16 15:02:00 UTC
A multi-vendor cache poisoning vulnerability named 'Rebirthday Attack' has been discovered in caching resolvers that support EDNS Client Subnet (ECS). Unbound is also vulnerable when compiled with ECS support, i.e., '--enable-subnet', AND configured to send ECS information along with queries to upstream name servers, i.e., at least one of the 'send-client-subnet', 'client-subnet-zone' or 'client-subnet-always-forward' options is used. Resolvers supporting ECS need to segregate outgoing queries to accommodate for different outgoing ECS information. This re-opens up resolvers to a birthday paradox attack (Rebirthday Attack) that tries to match the DNS transaction ID in order to cache non-ECS poisonous replies.


Note You need to log in before you can comment on or make changes to this bug.