DNSSEC validation is not performed correctly. An attacker can cause this package to report successful validation for invalid, attacker-controlled records. The owner name of RRSIG RRs is not validated, permitting an attacker to present the RRSIG for an attacker-controlled domain in a response for any other domain.
References
Link | Resource |
---|---|
https://github.com/peterzen/goresolver/issues/5 | Issue Tracking Third Party Advisory |
https://pkg.go.dev/vuln/GO-2022-0979 | Vendor Advisory |
https://github.com/peterzen/goresolver/issues/5 | Issue Tracking Third Party Advisory |
https://pkg.go.dev/vuln/GO-2022-0979 | Vendor Advisory |
Configurations
History
21 Nov 2024, 07:19
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/peterzen/goresolver/issues/5 - Issue Tracking, Third Party Advisory | |
References | () https://pkg.go.dev/vuln/GO-2022-0979 - Vendor Advisory |
Information
Published : 2022-12-28 03:15
Updated : 2024-11-21 07:19
NVD link : CVE-2022-3346
Mitre link : CVE-2022-3346
CVE.ORG link : CVE-2022-3346
JSON object : View
Products Affected
go-resolver_project
- go-resolver
CWE
CWE-345
Insufficient Verification of Data Authenticity