cve/2024/CVE-2024-33655.md

19 lines
904 B
Markdown
Raw Normal View History

2024-06-07 04:52:01 +00:00
### [CVE-2024-33655](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33655)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
The DNS protocol in RFC 1035 and updates allows remote attackers to cause a denial of service (resource consumption) by arranging for DNS queries to be accumulated for seconds, such that responses are later sent in a pulsing burst (which can be considered traffic amplification in some cases), aka the "DNSBomb" issue.
### POC
#### Reference
- https://gitlab.isc.org/isc-projects/bind9/-/issues/4398
- https://meterpreter.org/researchers-uncover-dnsbomb-a-new-pdos-attack-exploiting-legitimate-dns-features/
#### Github
No PoCs found on GitHub currently.