Lucene search

K
githubGitHub Advisory DatabaseGHSA-G5JH-57WM-P79M
HistorySep 04, 2024 - 3:30 p.m.

Missing connection timeout in Aardvark-dns

2024-09-0415:30:36
CWE-400
GitHub Advisory Database
github.com
1
aardvark-dns
denial of service
tcp connection
vulnerability
dns queries
serial processing

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

EPSS

0.001

Percentile

21.0%

A flaw was found in Aardvark-dns versions 1.12.0 and 1.12.1. They contain a denial of service vulnerability due to serial processing of TCP DNS queries. This flaw allows a malicious client to keep a TCP connection open indefinitely, causing other DNS queries to time out and resulting in a denial of service for all other containers using aardvark-dns.

Affected configurations

Vulners
Node
containersaardvark-dnsRange1.12.01.12.2
VendorProductVersionCPE
containersaardvark-dns*cpe:2.3:a:containers:aardvark-dns:*:*:*:*:*:*:*:*

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

EPSS

0.001

Percentile

21.0%