CVE-2024-33655

EUVD-2024-31371
The DNS protocol in RFC 1035 and updates allows remote attackers to cause a denial of service (resource consumption) by arranging for DNS queries to be accumulated for seconds, such that responses are later sent in a pulsing burst (which can be considered traffic amplification in some cases), aka the "DNSBomb" issue.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
7.5 HIGH
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CISA-ADPADP
7.5 HIGH
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Awaiting analysis
This vulnerability is currently awaiting analysis.
Base Score
CVSS 3.x
EPSS Score
Percentile: 88%
Debian logo
Debian Releases
Debian Product
Codename
unbound
bookworm
1.17.1-2+deb12u3
fixed
bookworm (security)
1.17.1-2+deb12u3
fixed
bullseye
vulnerable
bullseye (security)
1.13.1-1+deb11u7
fixed
buster
ignored
forky
1.24.2-1
fixed
sid
1.24.2-1
fixed
trixie
1.22.0-2
fixed
trixie (security)
1.22.0-2+deb13u1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
unbound
bionic
needs-triage
focal
Fixed 1.9.4-2ubuntu1.6
released
jammy
Fixed 1.13.1-1ubuntu5.5
released
mantic
Fixed 1.17.1-2ubuntu0.2
released
noble
Fixed 1.19.2-1ubuntu3.1
released
oracular
Fixed 1.20.0-1ubuntu1
released
plucky
Fixed 1.20.0-1ubuntu1
released
questing
Fixed 1.20.0-1ubuntu1
released
trusty
needs-triage
xenial
needs-triage
References