We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-25638

DNSJava DNSSEC Bypass



AssignerGitHub_M
Reserved2024-02-08
Published2024-07-22
Updated2024-09-04

Description

dnsjava is an implementation of DNS in Java. Records in DNS replies are not checked for their relevance to the query, allowing an attacker to respond with RRs from different zones. This vulnerability is fixed in 3.6.0.



HIGH: 8.9CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:L

Problem types

CWE-345: Insufficient Verification of Data Authenticity

CWE-349: Acceptance of Extraneous Untrusted Data With Trusted Data

Product status

< 3.6.0
affected

References

https://github.com/dnsjava/dnsjava/security/advisories/GHSA-cfxw-4h78-h7fw

https://github.com/dnsjava/dnsjava/commit/2073a0cdea2c560465f7ac0cc56f202e6fc39705

cve.org CVE-2024-25638

nvd.nist.gov CVE-2024-25638

Download JSON

Share this page
https://cve.threatint.com
Subscribe to our newsletter to learn more about our work.