
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2020-12663 affects Unbound DNS resolver versions before 1.10.1. The vulnerability was discovered and disclosed on May 19, 2020, through fuzzing of the Unbound code. This security issue involves an infinite loop vulnerability that can be triggered via malformed DNS answers received from upstream servers (Vendor Advisory).
The vulnerability stems from issues in the parser of received answers where malformed DNS responses from upstream servers can cause Unbound to enter an infinite loop. When compiled with --enable-debug, it can also trigger an assertion, resulting in a crash. The vulnerability has been assigned a CVSS v3.1 Base Score of 7.5 (HIGH) with vector CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H, indicating it is network accessible, requires low complexity to exploit, and primarily impacts availability (NVD).
When exploited, this vulnerability can cause the Unbound DNS resolver to become unresponsive, resulting in a denial of service condition. The impact is particularly severe as it affects the availability of DNS resolution services, which are critical for network operations (FreeBSD Advisory).
The primary mitigation is to upgrade to Unbound version 1.10.1 or later which contains the fix for this vulnerability. For those unable to upgrade immediately, a patch is available that can be applied manually using the command 'patch -p1 < patch_cve_2020-12662_2020-12663.diff' followed by 'make install' (Vendor Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."