Lucene search

K

Dproxy-nexgen Security Vulnerabilities

cve
cve

CVE-2022-33988

dproxy-nexgen (aka dproxy nexgen) re-uses the DNS transaction id (TXID) value from client queries, which allows attackers (able to send queries to the resolver) to conduct DNS cache-poisoning attacks because the TXID value is known to the attacker.

7.5CVSS

7.5AI Score

0.001EPSS

2022-08-15 01:15 PM
32
2
cve
cve

CVE-2022-33989

dproxy-nexgen (aka dproxy nexgen) uses a static UDP source port (selected randomly only at boot time) in upstream queries sent to DNS resolvers. This allows DNS cache poisoning because there is not enough entropy to prevent traffic injection attacks.

5.3CVSS

5.4AI Score

0.001EPSS

2022-08-15 01:15 PM
26
2
cve
cve

CVE-2022-33990

Misinterpretation of special domain name characters in dproxy-nexgen (aka dproxy nexgen) leads to cache poisoning because domain names and their associated IP addresses are cached in their misinterpreted form.

7.5CVSS

7.4AI Score

0.001EPSS

2022-08-15 01:15 PM
31
4
cve
cve

CVE-2022-33991

dproxy-nexgen (aka dproxy nexgen) forwards and caches DNS queries with the CD (aka checking disabled) bit set to 1. This leads to disabling of DNSSEC protection provided by upstream resolvers.

5.3CVSS

5.3AI Score

0.001EPSS

2022-08-15 01:15 PM
38