DNSSEC validation is not performed correctly. An attacker can cause this package to report successful validation for invalid, attacker-controlled records. Root DNSSEC public keys are not validated, permitting an attacker to present a self-signed root key and delegation chain.
References
Link | Resource |
---|---|
https://github.com/peterzen/goresolver/issues/5#issuecomment-1150214257 | Issue Tracking Third Party Advisory |
https://pkg.go.dev/vuln/GO-2022-1026 | Vendor Advisory |
https://github.com/peterzen/goresolver/issues/5#issuecomment-1150214257 | Issue Tracking Third Party Advisory |
https://pkg.go.dev/vuln/GO-2022-1026 | Vendor Advisory |
Configurations
History
21 Nov 2024, 07:19
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/peterzen/goresolver/issues/5#issuecomment-1150214257 - Issue Tracking, Third Party Advisory | |
References | () https://pkg.go.dev/vuln/GO-2022-1026 - Vendor Advisory |
Information
Published : 2022-12-28 03:15
Updated : 2024-11-21 07:19
NVD link : CVE-2022-3347
Mitre link : CVE-2022-3347
CVE.ORG link : CVE-2022-3347
JSON object : View
Products Affected
go-resolver_project
- go-resolver
CWE
CWE-345
Insufficient Verification of Data Authenticity