An issue was discovered in CoreDNS through 1.10.1. There is a vulnerability in DNS resolving software, which triggers a resolver to ignore valid responses, thus causing denial of service for normal resolution. In an exploit, the attacker could just forge a response targeting the source port of a vulnerable resolver without the need to guess the correct TXID.
References
Link | Resource |
---|---|
https://coredns.io/ | Product |
https://gist.github.com/idealeer/e41c7fb3b661d4262d0b6f21e12168ba | Third Party Advisory |
Configurations
History
26 Sep 2024, 18:37
Type | Values Removed | Values Added |
---|---|---|
References | () https://coredns.io/ - Product | |
References | () https://gist.github.com/idealeer/e41c7fb3b661d4262d0b6f21e12168ba - Third Party Advisory | |
CWE | NVD-CWE-noinfo | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
First Time |
Coredns.io
Coredns.io coredns |
|
CPE | cpe:2.3:a:coredns.io:coredns:*:*:*:*:*:*:*:* |
20 Sep 2024, 12:30
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
18 Sep 2024, 15:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-09-18 15:15
Updated : 2024-09-26 18:37
NVD link : CVE-2023-28452
Mitre link : CVE-2023-28452
CVE.ORG link : CVE-2023-28452
JSON object : View
Products Affected
coredns.io
- coredns
CWE