Lucene search

K
vulnrichmentMitreVULNRICHMENT:CVE-2024-33655
HistoryJun 06, 2024 - 12:00 a.m.

CVE-2024-33655

2024-06-0600:00:00
mitre
github.com
5
denial of service
dns protocol
rfc 1035
remote attackers
traffic amplification
dnsbomb

AI Score

6.8

Confidence

Low

SSVC

Exploitation

poc

Automatable

yes

Technical Impact

partial

The DNS protocol in RFC 1035 and updates allows remote attackers to cause a denial of service (resource consumption) by arranging for DNS queries to be accumulated for seconds, such that responses are later sent in a pulsing burst (which can be considered traffic amplification in some cases), aka the “DNSBomb” issue.

ADP Affected

[
  {
    "cpes": [
      "cpe:2.3:a:technitium:dns_server:*:*:*:*:*:*:*:*"
    ],
    "vendor": "technitium",
    "product": "dns_server",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "versionType": "custom",
        "lessThanOrEqual": "1.19.3"
      }
    ],
    "defaultStatus": "unknown"
  }
]

References

AI Score

6.8

Confidence

Low

SSVC

Exploitation

poc

Automatable

yes

Technical Impact

partial