
CVE-2023-28451
https://notcve.org/view.php?id=CVE-2023-28451
18 Sep 2024 — An issue was discovered in Technitium 11.0.2. There is a vulnerability (called BadDNS) in DNS resolving software, which triggers a resolver to ignore valid responses, thus causing DoS (denial of service) for normal resolution. The effects of an exploit would be widespread and highly impactful, because the attacker could just forge a response targeting the source port of a vulnerable resolver without the need to guess the correct TXID. • https://gist.github.com/idealeer/89947ca07836fd0f7e9761198ca9a0f3. • CWE-400: Uncontrolled Resource Consumption •

CVE-2023-28455
https://notcve.org/view.php?id=CVE-2023-28455
18 Sep 2024 — An issue was discovered in Technitium through 11.0.2. The forwarding mode enables attackers to create a query loop using Technitium resolvers, launching amplification attacks and causing potential DoS. • https://gist.github.com/idealeer/89947ca07836fd0f7e9761198ca9a0f3 • CWE-406: Insufficient Control of Network Message Volume (Network Amplification) •

CVE-2023-28456
https://notcve.org/view.php?id=CVE-2023-28456
18 Sep 2024 — An issue was discovered in Technitium through 11.0.2. It enables attackers to launch amplification attacks (3 times more than other "golden model" software like BIND) and cause potential DoS. • https://gist.github.com/idealeer/89947ca07836fd0f7e9761198ca9a0f3 • CWE-406: Insufficient Control of Network Message Volume (Network Amplification) •

CVE-2023-28457
https://notcve.org/view.php?id=CVE-2023-28457
18 Sep 2024 — An issue was discovered in Technitium through 11.0.3. It enables attackers to conduct a DNS cache poisoning attack and inject fake responses within 1 second, which is impactful. • https://gist.github.com/idealeer/89947ca07836fd0f7e9761198ca9a0f3 • CWE-345: Insufficient Verification of Data Authenticity •

CVE-2023-49203
https://notcve.org/view.php?id=CVE-2023-49203
18 Sep 2024 — Technitium 11.5.3 allows remote attackers to cause a denial of service (bandwidth amplification) because the DNSBomb manipulation causes accumulation of low-rate DNS queries such that there is a large-sized response in a burst of traffic. • https://gist.github.com/idealeer/89947ca07836fd0f7e9761198ca9a0f3. • CWE-406: Insufficient Control of Network Message Volume (Network Amplification) •

CVE-2024-33655 – Ubuntu Security Notice USN-6791-1
https://notcve.org/view.php?id=CVE-2024-33655
28 May 2024 — The DNS protocol in RFC 1035 and updates allows remote attackers to cause a denial of service (resource consumption) by arranging for DNS queries to be accumulated for seconds, such that responses are later sent in a pulsing burst (which can be considered traffic amplification in some cases), aka the "DNSBomb" issue. El protocolo DNS en RFC 1035 y sus actualizaciones permite a atacantes remotos provocar una denegación de servicio (consumo de recursos) organizando que las consultas DNS se acumulen durante se... • https://alas.aws.amazon.com/ALAS-2024-1934.html • CWE-400: Uncontrolled Resource Consumption •

CVE-2022-48256
https://notcve.org/view.php?id=CVE-2022-48256
13 Jan 2023 — Technitium DNS Server before 10.0 allows a self-CNAME denial-of-service attack in which a CNAME loop causes an answer to contain hundreds of records. Technitium DNS Server anterior a 10.0 permite un ataque de denegación de servicio CNAME propio en el que un bucle CNAME provoca que una respuesta contenga cientos de registros. • https://github.com/TechnitiumSoftware/DnsServer/blob/master/CHANGELOG.md#version-100 • CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop') •

CVE-2022-30257
https://notcve.org/view.php?id=CVE-2022-30257
21 Nov 2022 — An issue was discovered in Technitium DNS Server through 8.0.2 that allows variant V1 of unintended domain name resolution. A revoked domain name can still be resolvable for a long time, including expired domains and taken-down malicious domains. The effects of an exploit would be widespread and highly impactful, because the exploitation conforms to de facto DNS specifications and operational practices, and overcomes current mitigation patches for "Ghost" domain names. Se descubrió un problema en Technitium... • https://github.com/TechnitiumSoftware/DnsServer/blob/master/CHANGELOG.md#version-81 • CWE-706: Use of Incorrectly-Resolved Name or Reference •

CVE-2022-30258
https://notcve.org/view.php?id=CVE-2022-30258
21 Nov 2022 — An issue was discovered in Technitium DNS Server through 8.0.2 that allows variant V2 of unintended domain name resolution. A revoked domain name can still be resolvable for a long time, including expired domains and taken-down malicious domains. The effects of an exploit would be widespread and highly impactful, because the exploitation conforms to de facto DNS specifications and operational practices, and overcomes current mitigation patches for "Ghost" domain names. Se descubrió un problema en Technitium... • https://github.com/TechnitiumSoftware/DnsServer/blob/master/CHANGELOG.md#version-81 • CWE-706: Use of Incorrectly-Resolved Name or Reference •

CVE-2021-43105
https://notcve.org/view.php?id=CVE-2021-43105
28 Mar 2022 — A vulnerability in the bailiwick checking function in Technitium DNS Server <= v7.0 exists that allows specific malicious users to inject `NS` records of any domain (even TLDs) into the cache and conduct a DNS cache poisoning attack. Se presenta una vulnerabilidad en la función bailiwick checking en Technitium DNS Server versiones anteriores a v7.0 incluyéndola, que permite a usuarios maliciosos específicos inyectar registros "NS" de cualquier dominio (incluso TLD) en el caché y conducir un ataque de envene... • https://github.com/TechnitiumSoftware/DnsServer/blob/master/CHANGELOG.md •