3 results (0.004 seconds)

CVSS: 5.3EPSS: 0%CPEs: 1EXPL: 0

03 Oct 2024 — NLnet Labs Unbound up to and including version 1.21.0 contains a vulnerability when handling replies with very large RRsets that it needs to perform name compression for. Malicious upstreams responses with very large RRsets can cause Unbound to spend a considerable time applying name compression to downstream replies. This can lead to degraded performance and eventually denial of service in well orchestrated attacks. The vulnerability can be exploited by a malicious actor querying Unbound for the specially ... • https://www.nlnetlabs.nl/downloads/unbound/CVE-2024-8508.txt • CWE-606: Unchecked Input for Loop Condition •

CVSS: 7.5EPSS: 24%CPEs: 1EXPL: 1

07 Mar 2024 — NLnet Labs Unbound version 1.18.0 up to and including version 1.19.1 contain a vulnerability that can cause denial of service by a certain code path that can lead to an infinite loop. Unbound 1.18.0 introduced a feature that removes EDE records from responses with size higher than the client's advertised buffer size. Before removing all the EDE records however, it would try to see if trimming the extra text fields on those records would result in an acceptable size while still retaining the EDE codes. Due t... • https://github.com/passer12/CVE-2024-1931-reproduction • CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop') •

CVSS: 7.5EPSS: 2%CPEs: 64EXPL: 1

25 Jun 2007 — Header.pm in Net::DNS before 0.60, a Perl module, (1) generates predictable sequence IDs with a fixed increment and (2) can use the same starting ID for all child processes of a forking server, which allows remote attackers to spoof DNS responses, as originally reported for qpsmtp and spamassassin. Header.pm en Net::DNS anterior a 0.60, un módulo de Perl, (1) genera una secuencia predecible de IDs con un incremento fijo y (2) puede usar el mismo ID de inicio para todos los procesos hijos de un servidor de p... • ftp://patches.sgi.com/support/free/security/advisories/20070701-01-P.asc •