
CVE-2024-8508 – Unbounded name compression could lead to Denial of Service
https://notcve.org/view.php?id=CVE-2024-8508
03 Oct 2024 — NLnet Labs Unbound up to and including version 1.21.0 contains a vulnerability when handling replies with very large RRsets that it needs to perform name compression for. Malicious upstreams responses with very large RRsets can cause Unbound to spend a considerable time applying name compression to downstream replies. This can lead to degraded performance and eventually denial of service in well orchestrated attacks. The vulnerability can be exploited by a malicious actor querying Unbound for the specially ... • https://www.nlnetlabs.nl/downloads/unbound/CVE-2024-8508.txt • CWE-606: Unchecked Input for Loop Condition •

CVE-2024-1931 – Denial of service when trimming EDE text on positive replies
https://notcve.org/view.php?id=CVE-2024-1931
07 Mar 2024 — NLnet Labs Unbound version 1.18.0 up to and including version 1.19.1 contain a vulnerability that can cause denial of service by a certain code path that can lead to an infinite loop. Unbound 1.18.0 introduced a feature that removes EDE records from responses with size higher than the client's advertised buffer size. Before removing all the EDE records however, it would try to see if trimming the extra text fields on those records would result in an acceptable size while still retaining the EDE codes. Due t... • https://github.com/passer12/CVE-2024-1931-reproduction • CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop') •

CVE-2007-3377 – perl-Net-DNS security issue
https://notcve.org/view.php?id=CVE-2007-3377
25 Jun 2007 — Header.pm in Net::DNS before 0.60, a Perl module, (1) generates predictable sequence IDs with a fixed increment and (2) can use the same starting ID for all child processes of a forking server, which allows remote attackers to spoof DNS responses, as originally reported for qpsmtp and spamassassin. Header.pm en Net::DNS anterior a 0.60, un módulo de Perl, (1) genera una secuencia predecible de IDs con un incremento fijo y (2) puede usar el mismo ID de inicio para todos los procesos hijos de un servidor de p... • ftp://patches.sgi.com/support/free/security/advisories/20070701-01-P.asc •