U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2024-43168

Change History

CVE Source Update by NLnet Labs 10/21/2024 8:15:04 AM

Action Type Old Value New Value
Changed Source
Red Hat, Inc.
NLnet Labs

CVE Modified by NLnet Labs 10/21/2024 8:15:04 AM

Action Type Old Value New Value
Changed Description
A heap-buffer-overflow flaw was found in the cfg_mark_ports function within Unbound's config_file.c, which can lead to memory corruption. This issue could allow an attacker with local access to provide specially crafted input, potentially causing the application to crash or allowing arbitrary code execution. This could result in a denial of service or unauthorized actions on the system.
DISPUTE NOTE: this issue does not pose a security risk as it (according to analysis by the original software developer, NLnet Labs) falls within the expected functionality and security controls of the application. Red Hat has made a claim that there is a security risk within Red Hat products. NLnet Labs has no further information about the claim, and suggests that affected Red Hat customers refer to available Red Hat documentation or support channels. ORIGINAL DESCRIPTION: A heap-buffer-overflow flaw was found in the cfg_mark_ports function within Unbound's config_file.c, which can lead to memory corruption. This issue could allow an attacker with local access to provide specially crafted input, potentially causing the application to crash or allowing arbitrary code execution. This could result in a denial of service or unauthorized actions on the system.
Added CVSS V3.1

								
							
							
						
NLnet Labs AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L
Removed CVSS V3.1
Red Hat, Inc. AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L

								
						
Added CWE

								
							
							
						
NLnet Labs CWE-122
Removed CWE
Red Hat, Inc. CWE-122

								
						
Added Reference

								
							
							
						
NLnet Labs https://access.redhat.com/security/cve/CVE-2024-43168 [No types assigned]
Added Reference

								
							
							
						
NLnet Labs https://bugzilla.redhat.com/show_bug.cgi?id=2303462 [No types assigned]
Added Reference

								
							
							
						
NLnet Labs https://github.com/NLnetLabs/unbound/issues/1039 [No types assigned]
Added Reference

								
							
							
						
NLnet Labs https://github.com/NLnetLabs/unbound/pull/1040/files [No types assigned]
Removed Reference
Red Hat, Inc. https://access.redhat.com/security/cve/CVE-2024-43168

								
						
Removed Reference
Red Hat, Inc. https://bugzilla.redhat.com/show_bug.cgi?id=2303462

								
						
Removed Reference
Red Hat, Inc. https://github.com/NLnetLabs/unbound/issues/1039

								
						
Removed Reference
Red Hat, Inc. https://github.com/NLnetLabs/unbound/pull/1040/files