First published: Tue May 19 2020(Updated: )
Knot Resolver before 5.1.1 allows traffic amplification via a crafted DNS answer from an attacker-controlled server, aka an "NXNSAttack" issue. This is triggered by random subdomains in the NSDNAME in NS records.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/knot-resolver | 5.3.1-1+deb11u1 5.6.0-1+deb12u1 5.7.4-2 | |
Go-resolver | <5.1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-12667 is a vulnerability found in Knot Resolver before version 5.1.1.
The severity of CVE-2020-12667 is high, with a severity value of 7.5.
CVE-2020-12667 can be exploited through traffic amplification via a crafted DNS answer from an attacker-controlled server.
To fix CVE-2020-12667, users should upgrade to Knot Resolver version 5.1.1 or later.
You can find more information about CVE-2020-12667 at the following references: - http://cyber-security-group.cs.tau.ac.il/# - http://www.openwall.com/lists/oss-security/2020/05/19/2 - https://en.blog.nic.cz/2020/05/19/nxnsattack-upgrade-resolvers-to-stop-new-kind-of-random-subdomain-attack/