CVE-2024-33655
June 6, 2024, 5:15 p.m.
Tags
Product(s) Impacted
DNS Servers implementing RFC 1035
Description
The DNS protocol in RFC 1035 and updates allows remote attackers to cause a denial of service (resource consumption) by arranging for DNS queries to be accumulated for seconds, such that responses are later sent in a pulsing burst (which can be considered traffic amplification in some cases), aka the "DNSBomb" issue.
Weaknesses
Date
Published: June 6, 2024, 5:15 p.m.
Last Modified: June 6, 2024, 5:15 p.m.
Status : Received
CVE has been recently published to the CVE List and has been received by the NVD.
More infoSource
cve@mitre.org
References
https://alas.aws.amazon.com/
cve@mitre.org
https://datatracker.ietf.org/
cve@mitre.org
https://github.com/
cve@mitre.org
https://github.com/
cve@mitre.org
https://gitlab.isc.org/
cve@mitre.org
https://meterpreter.org/
cve@mitre.org
https://nlnetlabs.nl/
cve@mitre.org
https://nlnetlabs.nl/
cve@mitre.org
https://sp2024.ieee-security.org/
cve@mitre.org
https://www.isc.org/
cve@mitre.org