Nic

Knot Resolver

14 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Medienbericht
  • EPSS 42.22%
  • Veröffentlicht 14.02.2024 16:15:45
  • Zuletzt bearbeitet 12.05.2025 15:15:56

Certain DNSSEC aspects of the DNS protocol (in RFC 4033, 4034, 4035, 6840, and related RFCs) allow remote attackers to cause a denial of service (CPU consumption) via one or more DNSSEC responses, aka the "KeyTrap" issue. One of the concerns is that,...

  • EPSS 0.09%
  • Veröffentlicht 22.10.2023 23:15:08
  • Zuletzt bearbeitet 21.11.2024 08:28:17

Knot Resolver before 5.7.0 performs many TCP reconnections upon receiving certain nonsensical responses from servers.

  • EPSS 0.22%
  • Veröffentlicht 21.02.2023 02:15:10
  • Zuletzt bearbeitet 14.03.2025 19:15:41

Knot Resolver before 5.6.0 enables attackers to consume its resources, launching amplification attacks and potentially causing a denial of service. Specifically, a single client query may lead to a hundred TCP connection attempts if a DNS server clos...

  • EPSS 0.27%
  • Veröffentlicht 23.09.2022 16:15:11
  • Zuletzt bearbeitet 27.05.2025 15:15:28

Knot Resolver before 5.5.3 allows remote attackers to cause a denial of service (CPU consumption) because of algorithmic complexity. During an attack, an authoritative server must return large NS sets or address sets.

  • EPSS 0.27%
  • Veröffentlicht 20.06.2022 16:15:07
  • Zuletzt bearbeitet 21.11.2024 07:07:21

Knot Resolver through 5.5.1 may allow DNS cache poisoning when there is an attempt to limit forwarding actions by filters.

  • EPSS 0.84%
  • Veröffentlicht 25.08.2021 01:15:11
  • Zuletzt bearbeitet 21.11.2024 06:23:30

Knot Resolver before 5.3.2 is prone to an assertion failure, triggerable by a remote attacker in an edge case (NSEC3 with too many iterations used for a positive wildcard proof).

  • EPSS 0.5%
  • Veröffentlicht 30.03.2021 02:15:14
  • Zuletzt bearbeitet 21.11.2024 03:59:12

A flaw was found in knot-resolver before version 2.3.0. Malformed DNS messages may cause denial of service.

  • EPSS 0.54%
  • Veröffentlicht 19.05.2020 13:15:11
  • Zuletzt bearbeitet 21.11.2024 05:00:01

Knot Resolver before 5.1.1 allows traffic amplification via a crafted DNS answer from an attacker-controlled server, aka an "NXNSAttack" issue. This is triggered by random subdomains in the NSDNAME in NS records.

Exploit
  • EPSS 0.3%
  • Veröffentlicht 16.12.2019 16:15:11
  • Zuletzt bearbeitet 21.11.2024 04:34:35

knot-resolver before version 4.3.0 is vulnerable to denial of service through high CPU utilization. DNS replies with very many resource records might be processed very inefficiently, in extreme cases taking even several CPU seconds for each such unca...

  • EPSS 1.07%
  • Veröffentlicht 05.11.2019 19:15:10
  • Zuletzt bearbeitet 21.11.2024 01:57:54

Cache Poisoning issue exists in DNS Response Rate Limiting.