THREATINT

We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Zendesk (Helpdesk and Chat)

Ok

PUBLISHED

CVE-2024-33655

Reserved:2024-04-25
Published:2024-06-06
Updated:2024-06-10

Description

The DNS protocol in RFC 1035 and updates allows remote attackers to cause a denial of service (resource consumption) by arranging for DNS queries to be accumulated for seconds, such that responses are later sent in a pulsing burst (which can be considered traffic amplification in some cases), aka the "DNSBomb" issue.

References

https://datatracker.ietf.org/doc/html/rfc1035

https://nlnetlabs.nl/projects/unbound/security-advisories/

https://github.com/TechnitiumSoftware/DnsServer/blob/master/CHANGELOG.md#version-120

https://www.isc.org/blogs/2024-dnsbomb/

https://nlnetlabs.nl/downloads/unbound/CVE-2024-33655.txt

https://github.com/NLnetLabs/unbound/commit/c3206f4568f60c486be6d165b1f2b5b254fea3de

https://alas.aws.amazon.com/ALAS-2024-1934.html

https://meterpreter.org/researchers-uncover-dnsbomb-a-new-pdos-attack-exploiting-legitimate-dns-features/

https://sp2024.ieee-security.org/accepted-papers.html

https://gitlab.isc.org/isc-projects/bind9/-/issues/4398

https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QITY2QBX2OCBTZIXD2A5ES62STFIA4AL/ (FEDORA-2024-9df760819c) vendor-advisory

https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3TBXPRJ2Q235YUZKYDRWOSYNDFBJQWJ3/ (FEDORA-2024-68626e0eb5) vendor-advisory

cve.org CVE-2024-33655

nvd.nist.gov CVE-2024-33655

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-33655