cve/2024/CVE-2024-25638.md

20 lines
1015 B
Markdown
Raw Normal View History

2024-07-25 21:25:12 +00:00
### [CVE-2024-25638](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-25638)
![](https://img.shields.io/static/v1?label=Product&message=dnsjava&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%20%3C%203.6.0%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-345%3A%20Insufficient%20Verification%20of%20Data%20Authenticity&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-349%3A%20Acceptance%20of%20Extraneous%20Untrusted%20Data%20With%20Trusted%20Data&color=brighgreen)
### Description
dnsjava is an implementation of DNS in Java. Records in DNS replies are not checked for their relevance to the query, allowing an attacker to respond with RRs from different zones. This vulnerability is fixed in 3.6.0.
### POC
#### Reference
2024-08-05 18:41:32 +00:00
- https://github.com/dnsjava/dnsjava/commit/bc51df1c455e6c9fb7cbd42fcb6d62d16047818d
2024-07-25 21:25:12 +00:00
#### Github
- https://github.com/phax/peppol-commons
- https://github.com/phax/ph-web