CVE-2024-33655

The DNS protocol in RFC 1035 and updates allows remote attackers to cause a denial of service (resource consumption) by arranging for DNS queries to be accumulated for seconds, such that responses are later sent in a pulsing burst (which can be considered traffic amplification in some cases), aka the "DNSBomb" issue.
Configurations

No configuration.

History

22 Aug 2024, 19:35

Type Values Removed Values Added
CWE CWE-400
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.5

10 Jun 2024, 18:15

Type Values Removed Values Added
References
  • () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3TBXPRJ2Q235YUZKYDRWOSYNDFBJQWJ3/ -

10 Jun 2024, 17:16

Type Values Removed Values Added
References
  • () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QITY2QBX2OCBTZIXD2A5ES62STFIA4AL/ -

07 Jun 2024, 14:56

Type Values Removed Values Added
Summary
  • (es) El protocolo DNS en RFC 1035 y sus actualizaciones permite a atacantes remotos provocar una denegación de servicio (consumo de recursos) organizando que las consultas DNS se acumulen durante segundos, de modo que las respuestas se envíen posteriormente en una ráfaga pulsante (que puede considerarse amplificación del tráfico en algunos casos), también conocido como el problema "DNSBomb".

06 Jun 2024, 17:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-06-06 17:15

Updated : 2024-08-22 19:35


NVD link : CVE-2024-33655

Mitre link : CVE-2024-33655

CVE.ORG link : CVE-2024-33655


JSON object : View

Products Affected

No product.

CWE
CWE-400

Uncontrolled Resource Consumption