FreshPorts - VuXML

This page displays vulnerability information about FreeBSD Ports.

The VUXML data was last processed by FreshPorts on 2025-11-28 00:07:29 UTC

List all Vulnerabilities, by package

List all Vulnerabilities, by date

These are the vulnerabilities relating to the commit you have selected:

VuXML IDDescription
e27ee4fc-cdc9-45a1-8242-09898cdbdc91unbound -- Cache poisoning via the ECS-enabled Rebirthday Attack

sep@nlnetlabs.nl reports:

A multi-vendor cache poisoning vulnerability named 'Rebirthday Attack' has been discovered in caching resolvers that support EDNS Client Subnet (ECS). Unbound is also vulnerable when compiled with ECS support, i.e., '--enable-subnet', AND configured to send ECS information along with queries to upstream name servers, i.e., at least one of the 'send-client-subnet', 'client-subnet-zone' or 'client-subnet-always-forward' options is used. Resolvers supporting ECS need to segregate outgoing queries to accommodate for different outgoing ECS information. This re-opens up resolvers to a birthday paradox attack (Rebirthday Attack) that tries to match the DNS transaction ID in order to cache non-ECS poisonous replies.


Discovery 2025-07-16
Entry 2025-07-18
unbound
> 1.6.1 lt 1.23.0

CVE-2025-5994
https://nvd.nist.gov/vuln/detail/CVE-2025-5994
ea1c485f-b025-11f0-bce7-bc2411002f50unbound -- Possible domain hijacking via promiscuous records in the authority section

sep@nlnetlabs.nl reports:

NLnet Labs Unbound up to and including version 1.24.0 is vulnerable to possible domain hijack attacks. Promiscuous NS RRSets that complement positive DNS replies in the authority section can be used to trick resolvers to update their delegation information for the zone. Usually these RRSets are used to update the resolver's knowledge of the zone's name servers. A malicious actor can exploit the possible poisonous effect by injecting NS RRSets (and possibly their respective address records) in a reply. This could be done for example by trying to spoof a packet or fragmentation attacks. Unbound would then proceed to update the NS RRSet data it already has since the new data has enough trust for it, i.e., in-zone data for the delegation point. Unbound 1.24.1 includes a fix that scrubs unsolicited NS RRSets (and their respective address records) from replies mitigating the possible poison effect.


Discovery 2025-10-22
Entry 2025-10-23
Modified 2025-11-27
unbound
< 1.24.1

FreeBSD
>= 14.3 lt 14.3_6

>= 13.5 lt 13.5_7

CVE-2025-11411
https://nvd.nist.gov/vuln/detail/CVE-2025-11411
SA-25:10.unbound