-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
                         AUSCERT Security Bulletin

                               ASB-2011.0121
    Multiple vulnerabilities have been found in the Unbound DNS server.
                             21 December 2011

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:              Unbound 1.4.13
Operating System:     UNIX variants (UNIX, Linux, OSX)
                      Windows
Impact/Access:        Denial of Service -- Remote/Unauthenticated
Resolution:           Patch/Upgrade
CVE Names:            CVE-2011-4869 CVE-2011-4528 
Member content until: Friday, January 20 2012

OVERVIEW

        Multiple vulnerabilities have been found in the Unbound DNS server.
        These can lead to remote denial of service or daemon crash. [1]


IMPACT

        Unbound versions priror to 1.4.13p2 are vulnerable to a darmon crash 
        caused by malformed NSEC3 signed zones.  Upon validating the response 
        the daemoon will crash. [1]
        
        Versions priror to 1.4.13p2 are also vulnerable to a but which will 
        crash due to an attempt to free unallocated memory under certan 
        conditions. [2]


MITIGATION

        Both these issues have been fixed in the most recent verion of the 
        Unbound software.  Users of prevous versions of the software are 
        recomended to upgrade to the more recent 1.4.14 version which is not 
        vulnerable to this issue. [3]


REFERENCES

        [1] Description and conformation of vulnerability.
            http://www.unbound.net/downloads/CVE-2011-4528.txt

        [2] CVE-2011-4528
            http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-4528

        [3] Unbound 1.4.14 download.
            http://unbound.nlnetlabs.nl/downloads/unbound-1.4.14.tar.gz

AusCERT has made every effort to ensure that the information contained
in this document is accurate.  However, the decision to use the information
described is the responsibility of each user or organisation. The decision to
follow or act on information or advice contained in this security bulletin is
the responsibility of each user or organisation, and should be considered in
accordance with your organisation's site policies and procedures. AusCERT
takes no responsibility for consequences which may arise from following or
acting on information or advice contained in this security bulletin.

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours 
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=YbXb
-----END PGP SIGNATURE-----