First published: Fri May 10 2024(Updated: )
The DNS protocol in RFC 1035 and updates allows remote attackers to cause a denial of service (resource consumption) by arranging for DNS queries to be accumulated for seconds, such that responses are later sent in a pulsing burst (which can be considered traffic amplification in some cases), aka the "DNSBomb" issue.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ubuntu/unbound | <1.9.4-2ubuntu1.6 | 1.9.4-2ubuntu1.6 |
ubuntu/unbound | <1.13.1-1ubuntu5.5 | 1.13.1-1ubuntu5.5 |
ubuntu/unbound | <1.17.1-2ubuntu0.2 | 1.17.1-2ubuntu0.2 |
ubuntu/unbound | <1.19.2-1ubuntu3.1 | 1.19.2-1ubuntu3.1 |
ubuntu/unbound | <1.20.0-1 | 1.20.0-1 |
debian/unbound | <=1.9.0-2+deb10u2<=1.9.0-2+deb10u4<=1.13.1-1+deb11u1<=1.13.1-1+deb11u2<=1.17.1-2+deb12u1<=1.17.1-2+deb12u2 | 1.20.0-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-33655 is classified as a denial of service vulnerability that can lead to resource consumption.
To fix CVE-2024-33655, update the unbound package to version 1.9.4-2ubuntu1.6 or higher for Ubuntu, or the corresponding version for Debian.
Affected versions of unbound include versions earlier than 1.9.4-2ubuntu1.6 for Ubuntu and lower than 1.20.0-1 for Debian.
Yes, CVE-2024-33655 can be exploited by remote attackers through manipulated DNS queries.
The primary impact of CVE-2024-33655 is service disruption due to resource exhaustion caused by a burst of DNS responses.