CVE-2024-33655
June 6, 2024, 5:15 p.m.
None
No Score
Description
The DNS protocol in RFC 1035 and updates allows remote attackers to cause a denial of service (resource consumption) by arranging for DNS queries to be accumulated for seconds, such that responses are later sent in a pulsing burst (which can be considered traffic amplification in some cases), aka the "DNSBomb" issue.
Product(s) Impacted
Product | Versions |
---|---|
DNS Servers implementing RFC 1035 |
|
Weaknesses
Common security weaknesses mapped to this vulnerability.
References
Tags
Timeline
Published: June 6, 2024, 5:15 p.m.
Last Modified: June 6, 2024, 5:15 p.m.
Last Modified: June 6, 2024, 5:15 p.m.
Status : Received
CVE has been recently published to the CVE List and has been received by the NVD.
More infoSource
cve@mitre.org
*Disclaimer: Some vulnerabilities do not have an associated CPE. To enhance the data, we use AI to infer CPEs based on CVE details. This is an automated process and might not always be accurate.