Technitium

Dns Server

10 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.14%
  • Veröffentlicht 18.09.2024 15:15:14
  • Zuletzt bearbeitet 22.04.2025 14:19:00

An issue was discovered in Technitium through 11.0.2. The forwarding mode enables attackers to create a query loop using Technitium resolvers, launching amplification attacks and causing potential DoS.

  • EPSS 0.14%
  • Veröffentlicht 18.09.2024 15:15:14
  • Zuletzt bearbeitet 22.04.2025 14:19:10

An issue was discovered in Technitium through 11.0.2. It enables attackers to launch amplification attacks (3 times more than other "golden model" software like BIND) and cause potential DoS.

  • EPSS 0.15%
  • Veröffentlicht 18.09.2024 15:15:14
  • Zuletzt bearbeitet 22.04.2025 14:19:21

An issue was discovered in Technitium through 11.0.3. It enables attackers to conduct a DNS cache poisoning attack and inject fake responses within 1 second, which is impactful.

  • EPSS 0.7%
  • Veröffentlicht 18.09.2024 15:15:14
  • Zuletzt bearbeitet 10.07.2025 13:21:44

Technitium 11.5.3 allows remote attackers to cause a denial of service (bandwidth amplification) because the DNSBomb manipulation causes accumulation of low-rate DNS queries such that there is a large-sized response in a burst of traffic.

  • EPSS 0.13%
  • Veröffentlicht 18.09.2024 15:15:13
  • Zuletzt bearbeitet 22.04.2025 14:18:15

An issue was discovered in Technitium 11.0.2. There is a vulnerability (called BadDNS) in DNS resolving software, which triggers a resolver to ignore valid responses, thus causing DoS (denial of service) for normal resolution. The effects of an explo...

  • EPSS 3.92%
  • Veröffentlicht 06.06.2024 17:15:51
  • Zuletzt bearbeitet 04.11.2025 22:16:01

The DNS protocol in RFC 1035 and updates allows remote attackers to cause a denial of service (resource consumption) by arranging for DNS queries to be accumulated for seconds, such that responses are later sent in a pulsing burst (which can be consi...

  • EPSS 0.41%
  • Veröffentlicht 13.01.2023 01:15:10
  • Zuletzt bearbeitet 07.04.2025 16:15:18

Technitium DNS Server before 10.0 allows a self-CNAME denial-of-service attack in which a CNAME loop causes an answer to contain hundreds of records.

  • EPSS 0.43%
  • Veröffentlicht 21.11.2022 22:15:12
  • Zuletzt bearbeitet 30.04.2025 15:15:53

An issue was discovered in Technitium DNS Server through 8.0.2 that allows variant V2 of unintended domain name resolution. A revoked domain name can still be resolvable for a long time, including expired domains and taken-down malicious domains. The...

  • EPSS 0.43%
  • Veröffentlicht 21.11.2022 22:15:09
  • Zuletzt bearbeitet 30.04.2025 15:15:53

An issue was discovered in Technitium DNS Server through 8.0.2 that allows variant V1 of unintended domain name resolution. A revoked domain name can still be resolvable for a long time, including expired domains and taken-down malicious domains. The...

  • EPSS 0.09%
  • Veröffentlicht 28.03.2022 23:15:07
  • Zuletzt bearbeitet 21.11.2024 06:28:41

A vulnerability in the bailiwick checking function in Technitium DNS Server <= v7.0 exists that allows specific malicious users to inject `NS` records of any domain (even TLDs) into the cache and conduct a DNS cache poisoning attack.