Home

Description

NLnet Labs Unbound up to and including version 1.25.0 is vulnerable to poisoning via promiscuous records for the authority section. Promiscuous RRSets that complement DNS replies in the authority section can be used to trick Unbound to cache such records. If an adversary is able to attach such records in a reply (i.e., spoofed packet, fragmentation attack) he would be able to poison Unbound's cache. A malicious actor can exploit the possible poisonous effect by injecting RRSets other than NS that are also accompanied by address records in a reply, for example MX. This could be achieved by trying to spoof a reply packet or fragmentation attacks. Unbound would then accept the relative address records in the additional section and cache them if the authority RRSet has enough trust at this point, i.e., in-zone data for the delegation point. Unbound 1.25.1 contains a patch with a fix that disregards address records from the additional section if they are not explicitly relevant only to authority NS records, mitigating the possible poison effect. This is a complement fix to CVE-2025-11411.

PUBLISHED Reserved 2026-05-07 | Published 2026-05-20 | Updated 2026-05-20 | Assigner NLnet Labs




MEDIUM: 5.7CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:H/SA:H/E:P/U:Amber

Problem types

CWE-349: Acceptance of Extraneous Untrusted Data With Trusted Data

Product status

Default status
unaffected

Any version before 1.25.1
affected

Timeline

2025-11-28:Issue reported by TaoFei Guo
2025-11-28:NLnet Labs acknowledges the report
2025-12-22:NLnet Labs shares a patch
2026-03-16:TaoFei Guo verifies patch
2026-05-20:Fixes released with version 1.25.1

Credits

TaoFei Guo (Peking University) finder

Yang Luo (Tsinghua University) finder

JianJun Chen (Tsinghua University) finder

References

www.nlnetlabs.nl/downloads/unbound/CVE-2026-42960.txt vendor-advisory

cve.org (CVE-2026-42960)

nvd.nist.gov (CVE-2026-42960)

Download JSON