Show plain JSON{"id": "CVE-2011-4528", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 5.0, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "authentication": "NONE", "integrityImpact": "NONE", "accessComplexity": "LOW", "availabilityImpact": "PARTIAL", "confidentialityImpact": "NONE"}, "acInsufInfo": false, "impactScore": 2.9, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 10.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "published": "2011-12-20T11:55:05.757", "references": [{"url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-January/071525.html", "source": "cret@cert.org"}, {"url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-January/071535.html", "source": "cret@cert.org"}, {"url": "http://osvdb.org/77909", "source": "cret@cert.org"}, {"url": "http://secunia.com/advisories/47326", "source": "cret@cert.org"}, {"url": "http://unbound.nlnetlabs.nl/downloads/CVE-2011-4528.txt", "tags": ["Patch", "Vendor Advisory"], "source": "cret@cert.org"}, {"url": "http://www.debian.org/security/2011/dsa-2370", "source": "cret@cert.org"}, {"url": "http://www.kb.cert.org/vuls/id/209659", "tags": ["Patch", "Third Party Advisory", "US Government Resource"], "source": "cret@cert.org"}, {"url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-January/071525.html", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-January/071535.html", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://osvdb.org/77909", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://secunia.com/advisories/47326", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://unbound.nlnetlabs.nl/downloads/CVE-2011-4528.txt", "tags": ["Patch", "Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.debian.org/security/2011/dsa-2370", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.kb.cert.org/vuls/id/209659", "tags": ["Patch", "Third Party Advisory", "US Government Resource"], "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Deferred", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-399"}]}], "descriptions": [{"lang": "en", "value": "Unbound before 1.4.13p2 attempts to free unallocated memory during processing of duplicate CNAME records in a signed zone, which allows remote DNS servers to cause a denial of service (daemon crash) via a crafted response."}, {"lang": "es", "value": "Unbound antes de v1.4.13p2 intenta liberar memoria sin asignar durante el procesado de registros CNAME duplicados, lo que permite a servidores DNS remotos provocar una denegaci\u00f3n de servicio (ca\u00edda del demonio) a trav\u00e9s de una respuesta modificada."}], "lastModified": "2025-04-11T00:51:21.963", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:unbound:unbound:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DE7A3810-B4E1-4E49-B82E-1940D05BF8EF", "versionEndIncluding": "1.4.13"}, {"criteria": "cpe:2.3:a:unbound:unbound:0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7515192E-C07E-4399-85D0-2A1BC2F9B993"}, {"criteria": "cpe:2.3:a:unbound:unbound:0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "34D6D064-EA2B-4BA9-9D30-5A92DE178608"}, {"criteria": "cpe:2.3:a:unbound:unbound:0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "55FAC8A9-EF56-407C-BF10-41F7C768E30A"}, {"criteria": "cpe:2.3:a:unbound:unbound:0.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E302E40E-EA2F-4021-89BB-B6B9B6B995A7"}, {"criteria": "cpe:2.3:a:unbound:unbound:0.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E90F2613-9484-46DC-AE00-23F5E803771B"}, {"criteria": "cpe:2.3:a:unbound:unbound:0.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "39CCA38F-6DFD-4506-BAE3-A587F1A1D017"}, {"criteria": "cpe:2.3:a:unbound:unbound:0.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "10DD7299-6C4E-46EA-BAD8-FE8B868995A7"}, {"criteria": "cpe:2.3:a:unbound:unbound:0.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "836ABCDF-C8DB-4485-B7AE-E03AA281DB69"}, {"criteria": "cpe:2.3:a:unbound:unbound:0.7.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3992786F-0848-497D-8BE2-924C57FF94ED"}, {"criteria": "cpe:2.3:a:unbound:unbound:0.7.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AD592895-AF66-4F27-A7FE-00C4FCC06BFC"}, {"criteria": "cpe:2.3:a:unbound:unbound:0.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0FA67BEE-E12C-4CEA-AFF0-008B0226B4A1"}, {"criteria": "cpe:2.3:a:unbound:unbound:0.09:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FF97B8FC-4CC9-412E-A24D-6A74671EDE66"}, {"criteria": "cpe:2.3:a:unbound:unbound:0.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4D0C50E1-4234-452E-B172-9A5C180899F9"}, {"criteria": "cpe:2.3:a:unbound:unbound:0.11:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F81D9F43-8435-452A-8784-63BABA66BFA4"}, {"criteria": "cpe:2.3:a:unbound:unbound:1.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A2A428BA-0BA7-4BBF-AC59-C14E5CCD5DCC"}, {"criteria": "cpe:2.3:a:unbound:unbound:1.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0344EB60-49BD-4F42-A123-E68D92D4357C"}, {"criteria": "cpe:2.3:a:unbound:unbound:1.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "55620605-A826-45B6-A539-F93ACC6136F3"}, {"criteria": "cpe:2.3:a:unbound:unbound:1.1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CCB47D47-ECBC-491F-B75D-0C59D292F030"}, {"criteria": "cpe:2.3:a:unbound:unbound:1.1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D19FA146-0379-4FAD-ABD1-A5F74CEBEC4F"}, {"criteria": "cpe:2.3:a:unbound:unbound:1.2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8E4D0493-2252-4A24-9541-7ABE1D09A594"}, {"criteria": "cpe:2.3:a:unbound:unbound:1.2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4123BEB8-8BE3-4A63-9EA2-1CD81F673F16"}, {"criteria": "cpe:2.3:a:unbound:unbound:1.3.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B2E809EF-3FE1-45A5-B6F5-0ADBA3DD1B54"}, {"criteria": "cpe:2.3:a:unbound:unbound:1.3.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "43B6AF61-C55F-460B-AC6B-4736A49B9925"}, {"criteria": "cpe:2.3:a:unbound:unbound:1.3.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B3CEC475-F5E1-4663-BBDC-E7A0E8C4072E"}, {"criteria": "cpe:2.3:a:unbound:unbound:1.3.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "96AA4EB6-096C-47C6-8363-3D5652D89E33"}, {"criteria": "cpe:2.3:a:unbound:unbound:1.3.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "845BB2BD-4CEA-48DA-8FA4-CFB79DE03939"}, {"criteria": "cpe:2.3:a:unbound:unbound:1.4.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C9113AD4-25B3-40ED-80DB-5A4EC21AA1F5"}, {"criteria": "cpe:2.3:a:unbound:unbound:1.4.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9640A5D9-C1B3-49F1-AFAA-6D57066A2072"}, {"criteria": "cpe:2.3:a:unbound:unbound:1.4.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A6DC0896-75BA-4DD3-9B30-DFD531E4336E"}, {"criteria": "cpe:2.3:a:unbound:unbound:1.4.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1B2FDA5D-6F4F-4870-B229-FD48C663B8E4"}, {"criteria": "cpe:2.3:a:unbound:unbound:1.4.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "58C6E245-8D36-43B7-B1B0-9B0B19C45EAA"}, {"criteria": "cpe:2.3:a:unbound:unbound:1.4.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0DB6BD03-BBBF-4AD9-9076-30B423A345E0"}, {"criteria": "cpe:2.3:a:unbound:unbound:1.4.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9728B9F3-4A4C-4332-9821-D82F81C2F4C7"}, {"criteria": "cpe:2.3:a:unbound:unbound:1.4.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "27F18C3C-6E8B-46EF-8301-E3768F7AE739"}, {"criteria": "cpe:2.3:a:unbound:unbound:1.4.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0F238D5D-2E86-4F79-84ED-1822338AF65A"}, {"criteria": "cpe:2.3:a:unbound:unbound:1.4.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E0D54E5E-BF0E-46F3-BB3A-E0FC7F5B93A7"}, {"criteria": "cpe:2.3:a:unbound:unbound:1.4.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "564EB98A-535A-4EC5-B145-127156AD6452"}, {"criteria": "cpe:2.3:a:unbound:unbound:1.4.11:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FFFA0D04-1B5E-4F3F-811C-F46BAB760F03"}, {"criteria": "cpe:2.3:a:unbound:unbound:1.4.12:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3A01DA48-1220-4DC6-A74E-E1BAECB45DCB"}, {"criteria": "cpe:2.3:a:unbound:unbound:1.4.14:rc1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B4BEF501-D716-4618-BD78-0A2534712125"}], "operator": "OR"}]}], "evaluatorComment": "Per: http://unbound.nlnetlabs.nl/downloads/CVE-2011-4528.txt\r\n\r\n\"1.4.14 is released with the patch, but 1.4.14rc1 is vulnerable.\r\nhttp://www.unbound.net/downloads/unbound-1.4.14.tar.gz\"", "sourceIdentifier": "cret@cert.org"}