{ "id": "CVE-2024-33655", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-06T17:15:51.040", "lastModified": "2024-06-06T17:15:51.040", "vulnStatus": "Received", "descriptions": [ { "lang": "en", "value": "The DNS protocol in RFC 1035 and updates allows remote attackers to cause a denial of service (resource consumption) by arranging for DNS queries to be accumulated for seconds, such that responses are later sent in a pulsing burst (which can be considered traffic amplification in some cases), aka the \"DNSBomb\" issue." } ], "metrics": {}, "references": [ { "url": "https://alas.aws.amazon.com/ALAS-2024-1934.html", "source": "cve@mitre.org" }, { "url": "https://datatracker.ietf.org/doc/html/rfc1035", "source": "cve@mitre.org" }, { "url": "https://github.com/NLnetLabs/unbound/commit/c3206f4568f60c486be6d165b1f2b5b254fea3de", "source": "cve@mitre.org" }, { "url": "https://github.com/TechnitiumSoftware/DnsServer/blob/master/CHANGELOG.md#version-120", "source": "cve@mitre.org" }, { "url": "https://gitlab.isc.org/isc-projects/bind9/-/issues/4398", "source": "cve@mitre.org" }, { "url": "https://meterpreter.org/researchers-uncover-dnsbomb-a-new-pdos-attack-exploiting-legitimate-dns-features/", "source": "cve@mitre.org" }, { "url": "https://nlnetlabs.nl/downloads/unbound/CVE-2024-33655.txt", "source": "cve@mitre.org" }, { "url": "https://nlnetlabs.nl/projects/unbound/security-advisories/", "source": "cve@mitre.org" }, { "url": "https://sp2024.ieee-security.org/accepted-papers.html", "source": "cve@mitre.org" }, { "url": "https://www.isc.org/blogs/2024-dnsbomb/", "source": "cve@mitre.org" } ] }