Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Knot_resolver
(Nic)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 14 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2019-12-16 | CVE-2019-19331 | knot-resolver before version 4.3.0 is vulnerable to denial of service through high CPU utilization. DNS replies with very many resource records might be processed very inefficiently, in extreme cases taking even several CPU seconds for each such uncached message. For example, a few thousand A records can be squashed into one DNS message (limit is 64kB). | Debian_linux, Knot_resolver | 7.5 | ||
2022-09-23 | CVE-2022-40188 | Knot Resolver before 5.5.3 allows remote attackers to cause a denial of service (CPU consumption) because of algorithmic complexity. During an attack, an authoritative server must return large NS sets or address sets. | Debian_linux, Fedora, Knot_resolver | 7.5 | ||
2023-10-22 | CVE-2023-46317 | Knot Resolver before 5.7.0 performs many TCP reconnections upon receiving certain nonsensical responses from servers. | Knot_resolver | 7.5 | ||
2023-02-21 | CVE-2023-26249 | Knot Resolver before 5.6.0 enables attackers to consume its resources, launching amplification attacks and potentially causing a denial of service. Specifically, a single client query may lead to a hundred TCP connection attempts if a DNS server closes connections without providing a response. | Knot_resolver | 7.5 | ||
2022-06-20 | CVE-2022-32983 | Knot Resolver through 5.5.1 may allow DNS cache poisoning when there is an attempt to limit forwarding actions by filters. | Knot_resolver | 5.3 | ||
2021-08-25 | CVE-2021-40083 | Knot Resolver before 5.3.2 is prone to an assertion failure, triggerable by a remote attacker in an edge case (NSEC3 with too many iterations used for a positive wildcard proof). | Knot_resolver | 7.5 | ||
2021-03-30 | CVE-2018-1110 | A flaw was found in knot-resolver before version 2.3.0. Malformed DNS messages may cause denial of service. | Knot_resolver | 7.5 | ||
2018-08-02 | CVE-2018-10920 | Improper input validation bug in DNS resolver component of Knot Resolver before 2.4.1 allows remote attacker to poison cache. | Knot_resolver | N/A | ||
2019-11-05 | CVE-2013-5661 | Cache Poisoning issue exists in DNS Response Rate Limiting. | Bind, Knot_resolver, Nsd, Enterprise_linux | N/A | ||
2018-01-22 | CVE-2018-1000002 | Improper input validation bugs in DNSSEC validators components in Knot Resolver (prior version 1.5.2) allow attacker in man-in-the-middle position to deny existence of some data in DNS via packet replay. | Knot_resolver | N/A |