CVE-2024-33655

The DNS protocol in RFC 1035 and updates allows remote attackers to cause a denial of service (resource consumption) by arranging for DNS queries to be accumulated for seconds, such that responses are later sent in a pulsing burst (which can be considered traffic amplification in some cases), aka the "DNSBomb" issue.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7.5 HIGH
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
mitreCNA
---
---
CVEADP
---
---
CISA-ADPADP
7.5 HIGH
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Awaiting analysis
This vulnerability is currently awaiting analysis.
Base Score
CVSS 3.x
EPSS Score
Percentile: 81%
Debian logo
Debian Releases
Debian Product
Codename
unbound
bullseye
ignored
bookworm
ignored
buster
ignored
bullseye (security)
vulnerable
bookworm (security)
vulnerable
sid
1.22.0-1
fixed
trixie
1.22.0-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
unbound
plucky
Fixed 1.20.0-1ubuntu1
released
oracular
Fixed 1.20.0-1ubuntu1
released
noble
Fixed 1.19.2-1ubuntu3.1
released
mantic
Fixed 1.17.1-2ubuntu0.2
released
jammy
Fixed 1.13.1-1ubuntu5.5
released
focal
Fixed 1.9.4-2ubuntu1.6
released
bionic
needs-triage
xenial
needs-triage
trusty
needs-triage
References